[ https://issues.apache.org/jira/browse/KNOX-566?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14626579#comment-14626579 ]
Larry McCay commented on KNOX-566: ---------------------------------- Hi [~tanping] - This is likely due to the selected cipher with filefox as the client. Have you tried the openssl s_client -connect with the -cipher switch set to "EDH" as [~jeffreyr97] has done above? This may mean that we have to be able to ensure that only EDH ciphers are available on the server/s side but the setting of the key size should be fine. > Knox Jetty server is vulnerable to Logjam vulnerability > ------------------------------------------------------- > > Key: KNOX-566 > URL: https://issues.apache.org/jira/browse/KNOX-566 > Project: Apache Knox > Issue Type: Bug > Affects Versions: 0.5.0 > Environment: Red Hat Enterprise Linux Server release 6.4 (Santiago) > Reporter: Jeffrey E Rodriguez > Fix For: 0.7.0 > > > See description of logjam > "The Logjam Attack" > https://weakdh.org/ > To test you should do: > [root@bdvs1392 logs]# openssl s_client -connect bdvs1392.svl.ibm.com:8443 > -cipher "EDH" | grep "Server Temp Key" > depth=0 C = US, ST = Test, L = Test, O = Hadoop, OU = Test, CN = > bdvs1392.svl.ibm.com > verify error:num=18:self signed certificate > verify return:1 > depth=0 C = US, ST = Test, L = Test, O = Hadoop, OU = Test, CN = > bdvs1392.svl.ibm.com > verify return:1 > Server Temp Key: DH, 768 bits > The key should >= 1024 -- This message was sent by Atlassian JIRA (v6.3.4#6332)