Categories
Knowledge Support Support Categories exacqVision Webservice Products

SCN-00000010 – Explaining Web Service Architecture Change

SCN #SCN-00000010
Title of SCNExplaining Web Service Architecture Change
TRAC #
Effective Version9.0.0
Products AffectedWeb Service
Reason for Change (Summary)To better address the root of customer questions about Web Service security without creating more confusion.

Change

Engineering has requested that Support Technicians refrain from explaining the new Web Service as “having a ‘Go’ Web Front End”.  Rather, let the customer know that the new Web Server is “Custom”, or “written in-house”.  As comparison, it’s unnecessary to offer that ESM is primarily written in Python, or that the Client uses C++ and wxWidgets.  For detailed information on why this is necessary, and what customers are really asking, see below.

Additional Documentation

Apache HTTP Server Project

Go Programming Language

https://trac.exacq.com/DVR/wiki/WebServiceRearch

https://tycosecurityproducts.com/CyberProtection/CyberProtection.aspx

https://www.johnsoncontrols.com/buildings/specialty-pages/product-security

KB 47080 – Configuring Nginx or Apache as web service gateway

https://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard

Other Information

Customers who have been receiving security compliance scans are accustomed to needing to update their Web Service to get the latest security fixes.  Since version 2.4.0, the open-source Apache has been used by the exacqVision Web Service.  Apache is widely used around the world, and is (along with every other major Web Server) a common target of malicious attack.  This necessitated a process of “ever-updating” to make sure the customer is not vulnerable to the latest threats.

Beginning in Web Service version 9.0, the Apache HTTP Server was removed in favor of using a custom, in-house built Web Server.  This was not simply to achieve “security through obscurity”, rather we now have much more control over what changes are made to our Web Server, as well as the ability to optimize the functionality with our product.  This has led to great gains in the speed of Web Service functions. 

Customers are now asking what the new Web Server is and what kind of implication this has to the Security of the Web Service.  In trying to understand the change, many Support Technicians are in the habit of explaining the new Web Service as “having a ‘Go’ Web Front End”.  This is because the new Web Server is written in the Go Programming Language.  However, it’s unnecessary to offer what Language the software is written in.  Engineering has requested that we refrain from offering that it’s written in “Go” since this will inevitably lead to further un-needed questions. 

What customers are really asking is: “What effect does this change have on maintaining a secure Web Service?”  The answer is: “It depends.”

Normally, customers’ concerns regarding Web Service security are raised by a PCI Compliance Scan as required by the ‘Payment Card Industry Data Security Standard’.  Since Apache versions are closely monitored in these scans, and the exacqVision Web Service required user interaction to update the embedded Apache, our software commonly showed as problematic on these scans.  Since all PCI scans are different, customers should re-run these scans after updating to 9.0 to see if they still show vulnerabilities.  If any are found, customers are encouraged to setup their own web service gateway and enforce custom security policies as required by their company’s requirements.  Instructions can be found in KB 47080.  Customization of the exacqVision Web Server security policies will be limited, but not impossible.  If many customers are reporting the same issue, this will need to be escalated to the Engineering team for consideration.