Hi everyone,
A client of mine is unable to use her SSL as her bank requires she pass this 3rd party Security Metrics test of her web server.
Among other things, here are the main issues:
*Removing mod_frontpage as it is vulnerable to buffer overflow
* Remote SSH is prone to x11 session hijacking. Upgrade to openSSH 5.0 or later
* Disable TRACE and TRACK methods - subject to cross site scripting attacks
* Apache can be used to guess presence of a given user name. Set UserDir to disabled.
* Disable SSL 2.0 and use SSL 3.0 or TLS 1.0 instead
* Upgrade OpenSSL to 0.9.6m or 0.9.7d or newer
I contacted my hosting company and they said other than UserDir and TRACE/TRACK, the rest has to be done via cpanel when they push through a new update.
Has anyone dealt with these reports / issues before? I would hate to have to tell my client I can't get her to pass because cpanel doesn't have the updated software in place yet, but it's looking like I will have to wait for cpanel to update rather than do it myself.
Thanks in advance..
Mike
A client of mine is unable to use her SSL as her bank requires she pass this 3rd party Security Metrics test of her web server.
Among other things, here are the main issues:
*Removing mod_frontpage as it is vulnerable to buffer overflow
* Remote SSH is prone to x11 session hijacking. Upgrade to openSSH 5.0 or later
* Disable TRACE and TRACK methods - subject to cross site scripting attacks
* Apache can be used to guess presence of a given user name. Set UserDir to disabled.
* Disable SSL 2.0 and use SSL 3.0 or TLS 1.0 instead
* Upgrade OpenSSL to 0.9.6m or 0.9.7d or newer
I contacted my hosting company and they said other than UserDir and TRACE/TRACK, the rest has to be done via cpanel when they push through a new update.
Has anyone dealt with these reports / issues before? I would hate to have to tell my client I can't get her to pass because cpanel doesn't have the updated software in place yet, but it's looking like I will have to wait for cpanel to update rather than do it myself.
Thanks in advance..
Mike