[MXS-2522] Nessus security scan on MaxScale node shows vulnerability on maxctrl 8989 port Created: 2019-05-28 Updated: 2019-05-29 Resolved: 2019-05-29 |
|
| Status: | Closed |
| Project: | MariaDB MaxScale |
| Component/s: | N/A |
| Affects Version/s: | None |
| Fix Version/s: | N/A |
| Type: | Bug | Priority: | Major |
| Reporter: | Richard Lane | Assignee: | Unassigned |
| Resolution: | Not a Bug | Votes: | 0 |
| Labels: | None | ||
| Environment: |
Centos 7.6 |
||
| Description |
|
34850 (1) - Web Server Uses Basic Authentication Without HTTPS - An attacker eavesdropping the traffic might obtain logins and passwords of valid users. The following web pages use Basic Authentication over an unencrypted /:/ realm="maxscale" |
| Comments |
| Comment by markus makela [ 2019-05-29 ] |
|
The default is to use HTTP and only enable HTTPS once the certificates have been configured. To enable it, define the admin_ssl_key, admin_ssl_cert, and admin_ssl_ca_cert parameters under the [maxscale] section. The REST API tutorial covers the hardening of the REST API for non-development use. |