Skip to content

OHS must have the SSLSessionCacheTimeout directive set properly.

An XCCDF Rule

Description

<VulnDiscussion>During an SSL session, information about the session is stored in the global/inter-process SSL Session Cache, the OpenSSL internal memory cache and for sessions resumed by TLS session resumption (RFC 5077). This information must not be allowed to live forever, but expire and become invalid so that an attacker cannot hijack the session if not closed by the hosted application properly.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

ID
SV-221440r879887_rule
Severity
Medium
References
Updated



Remediation - Manual Procedure

1. Open $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/ssl.conf with an editor.

2. Search for the "SSLSessionCacheTimeout" directive at the OHS server configuration scope.

3. Set the "SSLSessionCacheTimeout" directive to "60", add the directive if it does not exist.