Information
The Apache web server has several remote communications channels. Examples are user requests via http/https, communication to a backend database, and communication to authenticate users. The encryption used to communicate must match the data that is being retrieved or presented.
Methods of communication are 'http' for publicly displayed information, 'https' to encrypt when user data is being transmitted, VPN tunneling, or other encryption methods to a database.
Satisfies: SRG-APP-000014-WSR-000006, SRG-APP-000015-WSR-000014, SRG-APP-000033-WSR-000169, SRG-APP-000172-WSR-000104, SRG-APP-000179-WSR-000110, SRG-APP-000179-WSR-000111, SRG-APP-000206-WSR-000128, SRG-APP-000429-WSR-000113, SRG-APP-000439-WSR-000151, SRG-APP-000439-WSR-000152, SRG-APP-000439-WSR-000156, SRG-APP-000441-WSR-000181, SRG-APP-000442-WSR-000182
Solution
Determine the location of the ssl.conf file:
# find / -name ssl.conf
Output: /etc/httpd/conf.d/ssl.conf
Ensure the 'SSLProtocol' is added to ssl.conf and looks like the following:
SSLProtocol -ALL +TLSv1.2
Restart Apache: apachectl restart
Item Details
References: CAT|II, CCI|CCI-000068, CCI|CCI-000197, CCI|CCI-000213, CCI|CCI-000803, CCI|CCI-001166, CCI|CCI-001453, CCI|CCI-002448, CCI|CCI-002450, CCI|CCI-002452, CCI|CCI-002506, Rule-ID|SV-214278r881466_rule, STIG-ID|AS24-U2-000030, STIG-Legacy|SV-102851, STIG-Legacy|V-92763, Vuln-ID|V-214278
Control ID: 056d9d47f53665d52f63a2fa713a1c4057e92ce78d008c38857fff9215c6dbf2