Hardening Access Anywhere
TLS Settings and Ciphers
(date updated 22 January 2019)
Please note that TLS cipher recommendations change as new threats are discovered. We recommend to use Mozilla SSL Configuration Generator to generate the list of ciphers.
When using Mozilla SSL Configuration Generator please select Apache server and Modern profile
As the root user edit the following file with the vi or nano editors:
vi /etc/httpd/conf.d/ssl.conf
Find and replace the following line: Note: It may line wrap and appear to be several lines
SSLCipherSuite ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:RSA+AESGCM:RSA+AES:!aNULL:!MD5:!DSS:!RSA
With(note always get the latest cipher list from Mozilla SSL Configuration Generator):
SSLCipherSuite ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256
Additionally Replace the line
SSLProtocol all -SSLv3 -TLSv1
with
SSLProtocol all -SSLv3 -TLSv1 -TLSv1.1
After saving the file restart apache
systemctl restart httpd
Disable CloudFTP
NAA provides legacy protocol adaptors i.e you can access any storage using FTP, FTPS and SFTP. FTP provider is unencrypted protocol. Disable FTP, FTPS and SFTP service depending on your security policy. For compatibility SFTP and FTPS support a wide range of encryption protocols and ciphers. For a locked down NAA deployment we recommend disabling CloudFTP service
As root
systemctl stop cloudftp systemctl disable cloudftp
Remove Apache HTTPD server Configuration NAA version <= 1901
The icons directory is listed , this is not a security risk but some scanning tools can mark it as security risk.
As root remove the following file
rm /etc/httpd/conf.d/autoindex.conf systemctl restart httpd