This might be relevant, ways to disable weak ciphers for port 8250, i'm
under impression same can be done for all java related processes. This
came from Citrix security team sometime in August, when we reached and
mentioned that 8250 exposes weak ciphers as per internal audit.
------------
Who Should apply this workaround?
This workaround is to make SSL Ciphers stronger than 128 bits. This
workaround is for customers running Citrix CloudPlatform version 3.x and
above. Apply this workaround on all the CloudPlatform 3.x and above
Management Servers.
Package Name
NA
Issues Resolved In This Hotfix
This workaround resolves the following issue:
CS-17504: Weak SSL ciphers supported by the management server
Installing the Hotfix
Use the following steps to for the workaround. As with any software
update, please back up your data before applying this workaround.
1. Stop the Management Server:# service cloudstack-management stop.
2. First Backup and then Modify java.security file at following
location (You may have different location based on your Java version),
if you are unsure, do a “find / -name java.security” to get the exact
location): #
cp
/usr/lib/jvm/java-1.7.0-openjdk-1.7.0.51.x86_64/jre/lib/security/java.security
java.security.backup
/usr/lib/jvm/java-1.7.0-openjdk-1.7.0.51.x86_64/jre/lib/security/java.security
3. Make following changes to java.security:#
#Start of Edit
#Following are the default settings, needs to be commented.
#jdk.certpath.disabledAlgorithms=MD2, RSA keySize < 1024
#Following needs to be added
jdk.tls.disabledAlgorithms=DH keySize < 128, RSA keySize < 128, DES
keySize < 128, SHA1 keySize < 128, MD5 keySize < 128, RC4 keySize < 128
# End of edit
4. Start the Management Server: # service cloudstack-management start.
Log in to the CloudPlatform UI as administrator, and check the status of
the hosts. All hosts should come to Up state (except those that you know
to be offline). You may need to wait 20 or 30 minutes, depending on the
number of hosts.
Troubleshooting: If login fails, clear your browser cache and reload the
page.
On 3/9/15 5:05 AM, Rohit Yadav wrote:
Hi Lucian,
I made a similar fix on 4.5/master today for apache2. I'm not sure how
to deal with this in Java. There are ways to get enabled cipher suites,
but should we be doing this or configuring the jre security settings?
On Monday 09 March 2015 04:21 PM, Nux! wrote:
Ok, so for Apache HTTPD something like this would do the job:
SSLProtocol all -SSLv2 -SSLv3 -TLSv1
SSLCipherSuite
ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!3DES:!MD5:!PSK
SSLHonorCipherOrder on
I do not know how to do this for the CPVM java thingy that runs
there; I think it's based on Jetty.
--
Sent from the Delta quadrant using Borg technology!
Nux!
www.nux.ro
----- Original Message -----
From: "Erik Weber" <terbol...@gmail.com>
To: "dev" <dev@cloudstack.apache.org>
Sent: Monday, 9 March, 2015 09:34:08
Subject: Re: New SSL vulnerability #FREAK
On Mon, Mar 9, 2015 at 9:59 AM, Nux! <n...@li.nux.ro> wrote:
BTW, the command I used is:
nmap --script ssl-enum-ciphers $HOST
I'm not entirely sure which cipher is good or not.
Anyone with EXPORT in it is bad (in the FREAK case).
This is a scan of my 4.3.2 systemvm with nmap:
| ssl-enum-ciphers:
| SSLv3:
| ciphers:
| TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA - weak
| TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA - strong
| TLS_DHE_RSA_WITH_AES_256_CBC_SHA - strong
| TLS_DHE_RSA_WITH_DES_CBC_SHA - weak
| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA - strong
| TLS_ECDHE_RSA_WITH_RC4_128_SHA - strong
| TLS_RSA_EXPORT_WITH_DES40_CBC_SHA - weak
| TLS_RSA_EXPORT_WITH_RC4_40_MD5 - weak
| TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong
| TLS_RSA_WITH_AES_128_CBC_SHA - strong
| TLS_RSA_WITH_AES_256_CBC_SHA - strong
| TLS_RSA_WITH_DES_CBC_SHA - weak
| TLS_RSA_WITH_RC4_128_MD5 - strong
| TLS_RSA_WITH_RC4_128_SHA - strong
| compressors:
| NULL
| TLSv1.0:
| ciphers:
| TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA - weak
| TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA - strong
| TLS_DHE_RSA_WITH_AES_256_CBC_SHA - strong
| TLS_DHE_RSA_WITH_DES_CBC_SHA - weak
| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA - strong
| TLS_ECDHE_RSA_WITH_RC4_128_SHA - strong
| TLS_RSA_EXPORT_WITH_DES40_CBC_SHA - weak
| TLS_RSA_EXPORT_WITH_RC4_40_MD5 - weak
| TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong
| TLS_RSA_WITH_AES_128_CBC_SHA - strong
| TLS_RSA_WITH_AES_256_CBC_SHA - strong
| TLS_RSA_WITH_DES_CBC_SHA - weak
| TLS_RSA_WITH_RC4_128_MD5 - strong
| TLS_RSA_WITH_RC4_128_SHA - strong
--
Erik
--
Regards,
Rohit Yadav
Software Architect, ShapeBlue
M. +91 8826230892 | rohit.ya...@shapeblue.com
Blog: bhaisaab.org | Twitter: @_bhaisaab
PS. If you see any footer below, I did not add it :)
Find out more about ShapeBlue and our range of CloudStack related
services
IaaS Cloud Design &
Build<http://shapeblue.com/iaas-cloud-design-and-build//>
CSForge – rapid IaaS deployment framework<http://shapeblue.com/csforge/>
CloudStack Consulting<http://shapeblue.com/cloudstack-consultancy/>
CloudStack Software
Engineering<http://shapeblue.com/cloudstack-software-engineering/>
CloudStack Infrastructure
Support<http://shapeblue.com/cloudstack-infrastructure-support/>
CloudStack Bootcamp Training
Courses<http://shapeblue.com/cloudstack-training/>
This email and any attachments to it may be confidential and are
intended solely for the use of the individual to whom it is addressed.
Any views or opinions expressed are solely those of the author and do
not necessarily represent those of Shape Blue Ltd or related
companies. If you are not the intended recipient of this email, you
must neither take any action based upon its contents, nor copy or show
it to anyone. Please contact the sender if you believe you have
received this email in error. Shape Blue Ltd is a company incorporated
in England & Wales. ShapeBlue Services India LLP is a company
incorporated in India and is operated under license from Shape Blue
Ltd. Shape Blue Brasil Consultoria Ltda is a company incorporated in
Brasil and is operated under license from Shape Blue Ltd. ShapeBlue SA
Pty Ltd is a company registered by The Republic of South Africa and is
traded under license from Shape Blue Ltd. ShapeBlue is a registered
trademark.