Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Config analysis for more services #331

Closed
1 of 4 tasks
m-1-k-3 opened this issue Oct 3, 2022 · 5 comments · Fixed by #1133
Closed
1 of 4 tasks

Config analysis for more services #331

m-1-k-3 opened this issue Oct 3, 2022 · 5 comments · Fixed by #1133
Labels
Core modules (Sxx) The core scanning modules (Sxx modules) EMBA enhancement New feature or request good first issue Good for newcomers help wanted Extra attention is needed

Comments

@m-1-k-3
Copy link
Member

m-1-k-3 commented Oct 3, 2022

Is your feature request related to a problem? Please describe.
There are multiple services we found in firmware:

  • Apache -> we will come back later if needed
  • lighttpd - see s36 module
  • mysql -> we will come back later if needed
  • postgresql -> we will come back later if needed

Describe the solution you'd like
EMBA should be able to analyse the configuration files of these services

@m-1-k-3 m-1-k-3 added enhancement New feature or request help wanted Extra attention is needed good first issue Good for newcomers labels Oct 3, 2022
@m-1-k-3
Copy link
Member Author

m-1-k-3 commented Oct 7, 2022

Regarding lighttpd we could easily check for some of the documented options: https://wiki.alpinelinux.org/wiki/Lighttpd_Advanced_security

ssl.cipher-list includes the entries: !aNULL:!eNULL:!EXPORT:!DES:!RC4:!3DES:!MD5:!PSK

The following options are enabled:
ssl.engine    = "enable"
ssl.disable-client-renegotiation = "enable"
ssl.honor-cipher-order = "enable"

ssl.pemfile   is set to something e.g. "/etc/lighttpd/server.pem"
and the permissions of the pem file are strict: chmod 400 /etc/lighttpd/server.pem

Further ideas?

@m-1-k-3 m-1-k-3 added the Core modules (Sxx) The core scanning modules (Sxx modules) label Oct 19, 2022
@github-actions
Copy link

This issue is stale because it has been open for 28 days with no activity.

@github-actions
Copy link

github-actions bot commented Mar 9, 2023

This issue is stale because it has been open for 28 days with no activity.

@github-actions github-actions bot added the stale label Mar 9, 2023
@m-1-k-3 m-1-k-3 added the EMBA label Sep 14, 2023
@github-actions github-actions bot removed the stale label Sep 16, 2023
@gstrauss
Copy link

gstrauss commented Oct 2, 2023

FYI: lighttpd 1.4.68 and later TLS defaults are now stronger. In the modern lighttpd config, the default set of ciphers all support perfect forward secrecy (PFS) and none of the ciphers in the default ciphers list are vulnerable to BEAST or Poodle, so lighttpd recommends leaving other TLS settings at their defaults, too. ssl.disable-client-renegotiation = "enable" is the default (disable client renegotation with TLS 1.2), and ssl.honor-cipher-order = "enable" is not the default since it is safe to honor the client preference from within the stronger lighttpd TLS default cipher list. Honoring client preference is useful for mobile devices which might not have AES crypto hardware support built-in to the silicon, and so might prefer CHACHA over AES.

@github-actions
Copy link

This issue is stale because it has been open for 28 days with no activity.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Core modules (Sxx) The core scanning modules (Sxx modules) EMBA enhancement New feature or request good first issue Good for newcomers help wanted Extra attention is needed
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants