27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

as usernames and passwords or hidden server resources in URIs is not recommended. Security through<br />

obscurity is not secure.<br />

URIs are often included with public <strong>Web</strong> c<strong>on</strong>tent. Although these URIs may not display as <strong>Web</strong> c<strong>on</strong>tent<br />

in a user’s <strong>Web</strong> browser, they can be easily discovered in the source code. Therefore, no publicly served<br />

<strong>Web</strong> c<strong>on</strong>tent should include sensitive URIs hidden in the source code. Many attackers and malicious bots<br />

(see Secti<strong>on</strong> 5.2.4) search the source code for sensitive URI informati<strong>on</strong>, including—<br />

E-mail addresses<br />

Images <strong>on</strong> other servers<br />

Links to other servers<br />

Particular text expressi<strong>on</strong>s (e.g., userid, password, root, administrator)<br />

Hidden form values<br />

Hyperlinks.<br />

A cookie is a small piece of informati<strong>on</strong> that may be written to the user’s hard drive when the user visits a<br />

<strong>Web</strong> site. The intent of cookies is to allow servers to recognize a specific browser (user). In essence,<br />

they add state to the stateless HTTP protocol. Because cookies are usually sent in the clear and stored in<br />

the clear <strong>on</strong> the user’s host, they are vulnerable to compromise. There are known vulnerabilities in<br />

certain versi<strong>on</strong>s of Internet Explorer, for example, that allow a malicious <strong>Web</strong> site to remotely collect all<br />

of a visitor’s cookies without the visitor’s knowledge. Therefore, cookies should never c<strong>on</strong>tain data that<br />

can be used directly by an attacker (e.g., username, password). OMB M-00-13 27 explicitly states that<br />

Federal <strong>Web</strong> sites should not use cookies unless there is a compelling need to gather the data <strong>on</strong> the site,<br />

and <strong>on</strong>ly with the appropriate approvals, notificati<strong>on</strong>s, and safeguards in place. For <strong>Web</strong> sites that need to<br />

maintain sessi<strong>on</strong> informati<strong>on</strong>, the sessi<strong>on</strong> identifier can be passed as part of the URL to the <strong>Web</strong> site<br />

rather than stored as a cookie. Regardless of whether cookies are being used or not, SSL/TLS should be<br />

used to prevent attackers from retrieving informati<strong>on</strong> from the HTTP messages sent over the network and<br />

using it to hijack a user’s sessi<strong>on</strong>.<br />

5.2.4 C<strong>on</strong>trolling Impact of <strong>Web</strong> “Bots” <strong>on</strong> <strong>Web</strong> <strong>Servers</strong><br />

<strong>Web</strong> bots (also known as crawlers or spiders) are software applicati<strong>on</strong>s used to collect, analyze, and index<br />

<strong>Web</strong> c<strong>on</strong>tent. <strong>Web</strong> bots are used by numerous organizati<strong>on</strong>s for many purposes. Some examples<br />

include—<br />

MSNBot, Slurp, and Googlebot slowly and carefully analyze, index, and record <strong>Web</strong> sites for <strong>Web</strong><br />

search engines such as Windows Live Search, Yahoo! and Google.<br />

Mediabot is used by Google to analyze c<strong>on</strong>tent served by an AdSense page so that c<strong>on</strong>textually<br />

relevant ads will be supplied.<br />

Hyperlink “validators” are used by <strong>Web</strong>masters to automatically validate the hyperlinks <strong>on</strong> their <strong>Web</strong><br />

site.<br />

27<br />

OMB M-00-13, Office of Management and Budget Memorandum 2000-13, 2000, is available at<br />

http://www.whitehouse.gov/omb/memoranda/m00-13.html.<br />

5-6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!