Jeffrey E  Rodriguez created KNOX-566:
-----------------------------------------

             Summary: Knox Jetty server is vulnerable to Logjam vulnerability
                 Key: KNOX-566
                 URL: https://issues.apache.org/jira/browse/KNOX-566
             Project: Apache Knox
          Issue Type: Bug
    Affects Versions: 0.5.0
         Environment: Red Hat Enterprise Linux Server release 6.4 (Santiago)

            Reporter: Jeffrey E  Rodriguez
             Fix For: 0.7.0


See description of logjam
"The Logjam Attack"
https://weakdh.org/


To test you should do:
[root@bdvs1392 logs]# openssl s_client -connect bdvs1392.svl.ibm.com:8443 
-cipher "EDH" | grep "Server Temp Key"
depth=0 C = US, ST = Test, L = Test, O = Hadoop, OU = Test, CN = 
bdvs1392.svl.ibm.com
verify error:num=18:self signed certificate
verify return:1
depth=0 C = US, ST = Test, L = Test, O = Hadoop, OU = Test, CN = 
bdvs1392.svl.ibm.com
verify return:1
Server Temp Key: DH, 768 bits


The key should >= 1024



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to