https://bz.apache.org/bugzilla/show_bug.cgi?id=58750

--- Comment #3 from Rob Winch <rwi...@gmail.com> ---
Thank you for the responses.

> It is also worth noting that because many system admins fake the server 
> header, most attackers try scanning for all known vulnerabilities anyway.

Some hackers may target specific applications. If that is the approach they are
taking, they are likely to try all exploits against the victim. As already
mentioned, exposing information will likely help them prioritize the exploits
to find something more quickly which will increase the likely hood that they go
undetected.

Hackers don't always target a specific victim. Another method of attack is to
have a known set of vulnerabilities and actively searching for victims.
Exposing any unnecessary information makes it easier for the attacker to find
victims in an automated way.



> In short, hiding the server header is a waste of time (even for instances 
> running insecure versions) that would be better spend upgrading insecure 
> instances to secure versions.

This isn't always possible. For example, there may be a 0-day exploit that has
no patched version or was just released & users have not had the opportunity to
update. Hackers are going to easily be able to find victims if the Server
header is exposed.



> Indeed, this provides absolutely no value :)

> In short, hiding the server header is a waste of time (even for instances
> running insecure versions) that would be better spend upgrading insecure
> instances to secure versions.

These seem like pretty bold claims. I'd be very interested in seeing some
citations.

I can provide countless credible citations that recommend removing the Server
header. I have provided a few additional examples below.

= OWASP

I provided this citation on the original report. However, since OWASP is such
an important part of web application security, I felt like this should be
emphasized.

OWASP states that "Information Leakage" is a class of vulnerability [1]. It is
described as:

    Revealing system data or debugging information helps an adversary learn
    about the system and form a plan of attack. An information leak occurs
    when system data or debugging information leaves the program through an
    output stream or logging function.

>From my perspective, the Server header is revealing unnecessary information.
This means it fits the OWASP description of "Information Leakage" and should be
removed.

= Troy Hunt (Microsoft MVP for Developer Security, etc)

I an excellent article by Troy Hunt (Microsoft MVP for Developer Security, etc)
on why you should remove unnecessary HTTP headers from the response [2]. Some
highlights of the article include:

* Why removing headers is not "security through obscurity"
* A concrete example of how exposing headers can help find victims of 0-day
exploits
* Additional citations on why headers that leak information should be removed

= RFC-2616 "15.1.2 Transfer of Sensitive Information"

The IETF recommends that server implementations SHOULD make the Server header a
configurable option [3].

   Revealing the specific software version of the server might allow the
   server machine to become more vulnerable to attacks against software
   that is known to contain security holes. Implementors SHOULD make the
   Server header field a configurable option.




[1] https://www.owasp.org/index.php/Information_Leakage
[2] http://www.troyhunt.com/2012/02/shhh-dont-let-your-response-headers.html
[3] http://www.rfc-base.org/txt/rfc-2616.txt

Regards,
Rob Winch

-- 
You are receiving this mail because:
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to