<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Questions in HPE OneView</title>
    <link>https://community.hpe.com/t5/hpe-oneview/security-questions/m-p/7028500#M3634</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.hpe.com/t5/user/viewprofilepage/user-id/1942556"&gt;@jp24&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Are you finding these with OneView 4.00 or 4.10?&lt;BR /&gt;The specific issue below you have stated:&lt;BR /&gt;&lt;SPAN&gt;Username Enumeration - it was found to respond differently to existing and non-existing users which made it possible to enumerate legitimate users&lt;BR /&gt;This defect has been fixed in a more recent version of OneView yet to be released.&lt;BR /&gt;&lt;BR /&gt;On the below:&lt;BR /&gt;Security Response Headers - the host did utilise common security headers as those recommended by OWASP secure headers project&lt;BR /&gt;Did this come back as a violation in the pen-test result?&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Bhaskar&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 14 Dec 2018 06:04:57 GMT</pubDate>
    <dc:creator>BhaskarV</dc:creator>
    <dc:date>2018-12-14T06:04:57Z</dc:date>
    <item>
      <title>Security Questions</title>
      <link>https://community.hpe.com/t5/hpe-oneview/security-questions/m-p/7028152#M3616</link>
      <description>&lt;P&gt;As part of pen testing the following came back, is it possible to address these in OneView?&lt;/P&gt;&lt;P&gt;Username Enumeration - it was found to respond differently to existing and non-existing users which made it possible to enumerate legitimate users&lt;/P&gt;&lt;P&gt;Security Response Headers - the host did utilise common security headers as those recommended by OWASP secure headers project&lt;/P&gt;</description>
      <pubDate>Tue, 11 Dec 2018 08:05:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/security-questions/m-p/7028152#M3616</guid>
      <dc:creator>jp24</dc:creator>
      <dc:date>2018-12-11T08:05:51Z</dc:date>
    </item>
    <item>
      <title>Re: Security Questions</title>
      <link>https://community.hpe.com/t5/hpe-oneview/security-questions/m-p/7028500#M3634</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.hpe.com/t5/user/viewprofilepage/user-id/1942556"&gt;@jp24&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Are you finding these with OneView 4.00 or 4.10?&lt;BR /&gt;The specific issue below you have stated:&lt;BR /&gt;&lt;SPAN&gt;Username Enumeration - it was found to respond differently to existing and non-existing users which made it possible to enumerate legitimate users&lt;BR /&gt;This defect has been fixed in a more recent version of OneView yet to be released.&lt;BR /&gt;&lt;BR /&gt;On the below:&lt;BR /&gt;Security Response Headers - the host did utilise common security headers as those recommended by OWASP secure headers project&lt;BR /&gt;Did this come back as a violation in the pen-test result?&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Bhaskar&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Dec 2018 06:04:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/security-questions/m-p/7028500#M3634</guid>
      <dc:creator>BhaskarV</dc:creator>
      <dc:date>2018-12-14T06:04:57Z</dc:date>
    </item>
    <item>
      <title>Re: Security Questions</title>
      <link>https://community.hpe.com/t5/hpe-oneview/security-questions/m-p/7031515#M3759</link>
      <description>&lt;P&gt;Hi Bhaskar,&lt;/P&gt;&lt;P&gt;Thank you for the reponse. These were related to version 4.10 of the Appliance.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Username Enumeration - Are you able to advise which version this may be?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Security Response Headers - although not defined critical from pen-test results which i understand follow industry standards it was their findings,&amp;nbsp; the calissifcation by the client may/see see it differently and prevent rollout.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Jan 2019 12:09:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/security-questions/m-p/7031515#M3759</guid>
      <dc:creator>jp24</dc:creator>
      <dc:date>2019-01-17T12:09:12Z</dc:date>
    </item>
    <item>
      <title>Re: Security Questions</title>
      <link>https://community.hpe.com/t5/hpe-oneview/security-questions/m-p/7033189#M3828</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.hpe.com/t5/user/viewprofilepage/user-id/1942556"&gt;@jp24&lt;/a&gt;&lt;/P&gt;&lt;P&gt;The next upcoming OneView release right after 4.10, has the fix for the username enumeration problem.&lt;/P&gt;&lt;P&gt;On the request headers that are flagged as a violation by OWASP,&amp;nbsp; can you share any details on that?&lt;/P&gt;&lt;P&gt;Regards.&lt;BR /&gt;Bhaskar&lt;/P&gt;</description>
      <pubDate>Fri, 01 Feb 2019 06:43:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/security-questions/m-p/7033189#M3828</guid>
      <dc:creator>BhaskarV</dc:creator>
      <dc:date>2019-02-01T06:43:30Z</dc:date>
    </item>
    <item>
      <title>Re: Security Questions</title>
      <link>https://community.hpe.com/t5/hpe-oneview/security-questions/m-p/7033651#M3866</link>
      <description>&lt;P&gt;Redacted Feedback&amp;nbsp;&lt;/P&gt;&lt;P&gt;Recommendation&lt;BR /&gt;It is strongly recommended recommend that the following security response headers are implemented in their highlighted&lt;BR /&gt;configuration:&lt;BR /&gt; X-XSS-Protection: 1; mode=block&lt;BR /&gt; Strict-Transport-Security: max-age=31536000; includeSubDomains&lt;BR /&gt; X-Content-Type-Options: nosniff&lt;BR /&gt; X-Frame-Options: deny&lt;BR /&gt; Cache-control: no store&lt;BR /&gt; Pragma: no-cache&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;References &amp;amp; Resources&lt;BR /&gt; &lt;A href="https://www.owasp.org/index.php/OWASP_Secure_Headers_Project#tab=Headers" target="_blank"&gt;https://www.owasp.org/index.php/OWASP_Secure_Headers_Project#tab=Headers&lt;/A&gt;&lt;BR /&gt; &lt;A href="https://www.owasp.org/index.php/Testing_for_Browser_cache_weakness_(OTG-AUTHN-006" target="_blank"&gt;https://www.owasp.org/index.php/Testing_for_Browser_cache_weakness_(OTG-AUTHN-006&lt;/A&gt;)&lt;/P&gt;</description>
      <pubDate>Tue, 05 Feb 2019 14:00:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/security-questions/m-p/7033651#M3866</guid>
      <dc:creator>jp24</dc:creator>
      <dc:date>2019-02-05T14:00:28Z</dc:date>
    </item>
    <item>
      <title>Re: Security Questions</title>
      <link>https://community.hpe.com/t5/hpe-oneview/security-questions/m-p/7033720#M3872</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.hpe.com/t5/user/viewprofilepage/user-id/1942556"&gt;@jp24&lt;/a&gt;&amp;nbsp; for sharing these.&lt;BR /&gt;Will check and respond.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Feb 2019 04:43:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/security-questions/m-p/7033720#M3872</guid>
      <dc:creator>BhaskarV</dc:creator>
      <dc:date>2019-02-06T04:43:40Z</dc:date>
    </item>
    <item>
      <title>Re: Security Questions</title>
      <link>https://community.hpe.com/t5/hpe-oneview/security-questions/m-p/7034888#M3916</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.hpe.com/t5/user/viewprofilepage/user-id/1942556"&gt;@jp24&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry about the delay.&lt;BR /&gt;The below headers are addressed in an upcoming release.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt; X-XSS-Protection: 1; mode=block&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt; X-Content-Type-Options: nosniff&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt; X-Frame-Options: deny&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt; Pragma: no-cache&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;We are evaluating the below two still and we'll take them up approriately.&lt;BR /&gt; Cache-control: no store&lt;BR /&gt; Strict-Transport-Security: max-age=31536000; includeSubDomains&lt;BR /&gt;&lt;BR /&gt;Thank you.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Bhaskar&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Feb 2019 13:37:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/security-questions/m-p/7034888#M3916</guid>
      <dc:creator>BhaskarV</dc:creator>
      <dc:date>2019-02-15T13:37:57Z</dc:date>
    </item>
    <item>
      <title>Re: Security Questions</title>
      <link>https://community.hpe.com/t5/hpe-oneview/security-questions/m-p/7037269#M3978</link>
      <description>&lt;P&gt;Thank you for the update.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2019 10:36:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/security-questions/m-p/7037269#M3978</guid>
      <dc:creator>jp24</dc:creator>
      <dc:date>2019-03-06T10:36:43Z</dc:date>
    </item>
  </channel>
</rss>

