OH12-1X-000065 - OHS, behind a load balancer or proxy server, must have a log file defined for each site/virtual host to produce log records containing the client IP information as the source and destination and not the load balancer or proxy IP information with each event.

Information

Web server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined.

Ascertaining the correct source, e.g., source IP, of the events is important during forensic analysis. Correctly determining the source of events will add information to the overall reconstruction of the logable event. By determining the source of the event correctly, analysis of the enterprise can be undertaken to determine if events tied to the source occurred in other areas within the enterprise.

A web server behind a load balancer or proxy server, when not configured correctly, will record the load balancer or proxy server as the source of every logable event. When looking at the information forensically, this information is not helpful in the investigation of events. The web server must record with each event the client source of the event.

Solution

1. Open $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/httpd.conf and every .conf file (e.g., ssl.conf) included in it with an editor that contains a '<VirtualHost>' directive.

2. Search for the 'CustomLog' directive at the OHS server and virtual host configuration scopes.

3a. If the virtual host is NOT configured for SSL, set the 'CustomLog' directive to ''||${PRODUCT_HOME}/bin/odl_rotatelogs <DESIRED_DIRECTORY_AND_FILE_NAME> 43200' dod', add the directive if it does not exist unless inherited from a larger scope.
3b. If the virtual host is configured for SSL, set the 'CustomLog' directive to ''||${PRODUCT_HOME}/bin/odl_rotatelogs <DESIRED_DIRECTORY_AND_FILE_NAME> 43200' dod_ssl', add the directive if it does not exist unless inherited from a larger scope.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_HTTP_Server_12-1-3_V2R2_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-3, CAT|II, CCI|CCI-000133, Rule-ID|SV-221327r879566_rule, STIG-ID|OH12-1X-000065, STIG-Legacy|SV-78711, STIG-Legacy|V-64221, Vuln-ID|V-221327

Plugin: Unix

Control ID: 1603fc8af228a5b61e37347cb213001814093a5b0f49476737ece8f2c986d94c