A new security issue hit the streets this week: the Poodle SSL bug. While the vulnerability is mostly triggered by the client, it’s also possible to prevent attack by disabling the use of SSLv3 all together on the server side, eg. OpenDJ.
from Ludovic Poitou blog about Identity, Directory and others…
While the vulnerability is mostly triggered by the client, it’s also possible to prevent attack by disabling the use of SSLv3 all together on the server side. Beware that disabling SSLv3 might break old legacy client applications.
OpenDJ uses the SSL implementation provided by Java, and by default will allow use of all the TLS protocols supported by the JVM. You can restrict the set of protocols for the Java VM installed on the system using deployment.properties (on the Mac, using the Java Preferences Panel, in the Advanced Mode), or using environment properties at startup (-Ddeployment.security.SSLv3=false). I will let you search through the official Java documentations for the details.
But you can also control the protocols used by OpenDJ itself. If you want to do so, you will need to change settings in several places :
- the LDAPS Connection Handler, since this is the one dealing with LDAP over SSL/TLS.
- the LDAP Connection Handler, if the startTLS extended operation is to be used to negotiate SSL/TLS establishment on the LDAP connection.
- the HTTP Connection Handler, if you have enabled it to activate the RESTful APIs
- The Crypto Manager, whose settings are used by Replication and possibly the Pass Through Authentication Plugin.
- The Administration Connector, which is also using LDAPS.
For example, to change the settings in the LDAPS Connection Handler, you would run the following command :
# dsconfig set-connection-handler-prop --handler-name "LDAPS Connection Handler" \
--add ssl-protocol:TLSv1 --add ssl-protocol:TLSv1.1 --add ssl-protocol:TLSv1.2 \
-h localhost -p 4444 -X -D "cn=Directory Manager" -w secret12 -n
Repeat for the LDAP Connection Handler and the HTTP Connection Handler.
For the crypto manager, use the following command:
# dsconfig set-crypto-manager-prop \
--add ssl-protocol:TLSv1 --add ssl-protocol:TLSv1.1 --add ssl-protocol:TLSv1.2 \
-h localhost -p 4444 -X -D "cn=Directory Manager" -w secret12 -n
And for the Administration Connector :
# dsconfig set-administration-connector-prop \
--add ssl-protocol:TLSv1 --add ssl-protocol:TLSv1.1 --add ssl-protocol:TLSv1.2 \
-h localhost -p 4444 -X -D "cn=Directory Manager" -w secret12 -n
All of these changes will take effect immediately, but they will only impact new connections established after the change.
- New Keycloak online training - 19 janvier 2022
- Sizing Keycloak or Redhat SSO projects - 8 juin 2021
- Keycloak.X Distribution - 28 janvier 2021