Re: Security Vulnerability on my Jenkins Server

2021-02-10 Thread Eric Fetzer
Thanks, guess we'll have to wait. It's not based on what we do, it's just a security scan software. It's not like anyone can get to it anyway, it's inside the wall, but it is what it is. This one will have to become a POAM. Do you have any clue when the fix is coming up? Again, THANKS for all

Re: Security Vulnerability on my Jenkins Server

2021-02-10 Thread kuisathaverat
I’ve re read your first message, you as for “Jenkins CLI over SSH”, there you cannot do anything until we replace the ssh-module. The module will support those MACs and is not posible to disable them. However, I doubt that the Jenkins CLI use those MACs , and you can always use HTTPS. El El mié, 1

Re: Security Vulnerability on my Jenkins Server

2021-02-10 Thread Eric Fetzer
My MACs line says: MACs hmac-ripemd160,hmac-sha2-256,hmac-sha2-512,hmac-ripemd...@openssh.com I believe this is hardened, isn't it? Thanks, Eric On Wed, Feb 10, 2021 at 9:40 AM kuisathaverat wrote: > hmac-* are Message authentication code algorithms (MACs), so you have to > configure your Mes

Re: Security Vulnerability on my Jenkins Server

2021-02-10 Thread kuisathaverat
hmac-* are Message authentication code algorithms (MACs), so you have to configure your Message authentication code algorithms (MACs) supported, for example MACs hmac-sha2-256,hmac-sha2-512 see https://www.ssh.com/ssh/sshd_config/#common-configuration-changes-for-the-enterprise El mié, 10 feb 20

Re: Security Vulnerability on my Jenkins Server

2021-02-10 Thread Eric Fetzer
Hmmm, I already hardened by that link: https://www.ssh.com/ssh/sshd_config My /etc/ssh/sshd_config has: Ciphers aes128-ctr,aes192-ctr,aes256-ctr This is still showing up on my security scan though. Am I missing something? Thanks, Eric On Tue, Feb 9, 2021 at 12:23 PM kuisathaverat wrote: >

Re: Security Vulnerability on my Jenkins Server

2021-02-09 Thread kuisathaverat
There is work in progress to bump the version of the library and convert the sshd-module in a plugin to resolve this kind of issues quickly. For the moment you can configure your sshd servers on the Agents side to do not allow weak ciphers, see https://www.ssh.com/ssh/sshd_config. https://github.c

Re: Security Vulnerability on my Jenkins Server

2021-02-09 Thread eric....@gmail.com
I'm sorry, I just saw the last comment on here and, once again, this showed up on our vulnerability report. I don't get exactly what I need to do in order to fix this. Can someone lay it out for me please? Thanks - Eric On Wednesday, August 26, 2020 at 12:39:40 PM UTC-6 kuisat...@gmail.com w

Re: Security Vulnerability on my Jenkins Server

2020-08-26 Thread Ivan Fernandez Calvo
I was wrong you cannot configure the ciphers for the ssh server on the Java security files. The SSH server on Jenkins uses the https://github.com/apache/mina-sshd , IIRC the Jenkins implementation of the ssh server not read the sshd_config files so it is not posible to configure the ssh server.

Re: Security Vulnerability on my Jenkins Server

2020-08-26 Thread eric....@gmail.com
I think I found the solution to this: https://www.thegeekdiary.com/how-to-disable-md5-based-hmac-algorithms-for-ssh/ On Tuesday, August 25, 2020 at 1:59:49 PM UTC-6 eric@gmail.com wrote: > I'm confused. It doesn't look like the ciphers the vulnerability is > citing are allowed in the ja

Re: Security Vulnerability on my Jenkins Server

2020-08-25 Thread eric....@gmail.com
I'm confused. It doesn't look like the ciphers the vulnerability is citing are allowed in the java.security file on this system. We're getting flagged for: hmac-md5 hmac-md5-96 hmac-sha1-96 Settings are: jdk.tls.disabledAlgorithms=SSLv3, RC4, DES, MD5withRSA, DH keySize < 1024, \ EC

Re: Security Vulnerability on my Jenkins Server

2020-08-24 Thread Ivan Fernandez Calvo
Yes, configuring the ciphers accepted by your JDK edit the file lib\security\java.security (the path will vary based on your Java version) El lunes, 24 de agosto de 2020 a las 16:48:22 UTC+2, eric@gmail.com escribió: > Hi all! I'm getting hit by my secuity team for a vulnerability for the

Security Vulnerability on my Jenkins Server

2020-08-24 Thread eric....@gmail.com
Hi all! I'm getting hit by my secuity team for a vulnerability for the Jenkins CLI via ssh allowing the following weak ciphers: hmac-md5 hmac-md5-96 hmac-sha1-96 Is there a way to configure ciphers accepted for the Jenkins CLI? Thanks, Eric -- You received this message because you are

Security Vulnerability

2019-01-21 Thread mohan reddy
SM-7 Missing secure flag on session ID In secure HTTPS applications, cookies must have the “Secure” flag set. The “Secure” flag informs browsers that a cookie should only be sent on connections that are encrypted with SSL. Without the “secure” flag, the non-encrypted HTTP domain for the appl

RE: Why is Jenkins suddenly telling me about an old security vulnerability

2018-10-22 Thread matthew.web...@diamond.ac.uk
ober 2018 18:02 > To: Jenkins Users > Subject: Re: Why is Jenkins suddenly telling me about an old security > vulnerability > > This is supposed to only show when Jenkins detects an upgrade from 1.495 or > older. IIRC, it uses information from the global config.xml to determine

Re: Why is Jenkins suddenly telling me about an old security vulnerability

2018-10-19 Thread Daniel Beck
displayed a message in the WebUI: > "Because of a security vulnerability discovered earlier, we need to change > the encryption key used to protect secrets in your configuration files on the > disk. This process scans a large portion of your $JENKINS_HOME, find > encrypted data

Why is Jenkins suddenly telling me about an old security vulnerability

2018-10-19 Thread matthew.web...@diamond.ac.uk
We recently upgraded Jenkins from 2.146 to 2.147 (which is the newest release at the time of writing). Since then, Jenkins has displayed a message in the WebUI: "Because of a security vulnerability discovered earlier, we need to change the encryption key used to protect secrets in

Re: Jenkins - Security Vulnerability

2018-05-22 Thread mohan reddy
Hi All, I just want to know if we have any thing can be done to bring this to closure. Any help that you provide is greatly appreciated. -Mohan On Monday, May 21, 2018 at 6:43:37 PM UTC+5:30, mohan reddy wrote: > > Hi Team, > > I was hoping that you would put me in the correct direction. I ha