From A10 Networks ADC ALG Security Technical Implementation Guide
Part of SRG-NET-000273-ALG-000129
Associated with: CCI-001312
Providing too much information in error messages risks compromising the data and security of the application and system. HTTP response headers can disclose vulnerabilities about a web server. This information can be used by an attacker. The A10 Networks ADC can filter response headers; this removes the web server’s identifying headers in outgoing responses (such as Server, X-Powered-By, and X-AspNet-Version).
If the device is not used to load balance web servers, this is not applicable. If the device is used to load balance web servers, verify that the A10 Networks ADC strips HTTP response headers. The following command displays WAF templates: show slb template waf If the configured WAF templates do not have the "filter-resp-hdrs" option configured, this is a finding.
If the device is used to load balance web servers, configure the device to strip HTTP response headers. The following command configures a WAF template and includes the option to strip HTTP response headers: slb template waf filter-resp-hdrs
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer