[ 
https://issues.apache.org/jira/browse/KNOX-566?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14628543#comment-14628543
 ] 

Larry McCay edited comment on KNOX-566 at 7/15/15 7:05 PM:
-----------------------------------------------------------

Okay - I have provided a configuration element in gateway-site.xml 
"gateway.jdk.tls.ephemeralDHKeySize" in order to override a default of 2048. 
The JettySSLService then sets the system property in its init().

Had to upgrade my Java 8 version to 1.8.0_51 and openssl to 1.0.2d_1 in order 
to display the Server Temp Key.

Here is the default configuration behavior:

{code}
bash-3.2$ openssl s_client -connect localhost:8443 -cipher "EDH" | grep "Server 
.* Key"
depth=0 C = US, ST = Test, L = Test, O = Hadoop, OU = Test, CN = localhost
verify error:num=18:self signed certificate
verify return:1
depth=0 C = US, ST = Test, L = Test, O = Hadoop, OU = Test, CN = localhost
verify return:1
Server Temp Key: DH, 2048 bits
{code}

Overridden to be 1024:

{code}
bash-3.2$ openssl s_client -connect localhost:8443 -cipher "EDH" | grep "Server 
.* Key"
depth=0 C = US, ST = Test, L = Test, O = Hadoop, OU = Test, CN = localhost
verify error:num=18:self signed certificate
verify return:1
depth=0 C = US, ST = Test, L = Test, O = Hadoop, OU = Test, CN = localhost
verify return:1
Server Temp Key: DH, 1024 bits
{code}

Overridden to be the old default of 768:

{code}
bash-3.2$ openssl s_client -connect localhost:8443 -cipher "EDH" | grep "Server 
.* Key"
140735228482400:error:140790E5:SSL routines:ssl23_write:ssl handshake 
failure:s23_lib.c:177:
{code}

I need to spend a bit more time ensuring that a default of 2048 doesn't break 
anything on older JDK's etc.



was (Author: lmccay):
Okay - I have provided a configuration element in gateway-site.xml 
"gateway.jdk.tls.ephemeralDHKeySize" in order to override a default of 2048. 
The JettySSLService then sets the system property in its init().

Had to upgrade my Java 8 version to 1.8.0_51 and openssl to 1.0.2d_1 in order 
to display the Server Temp Key.

I need to spend a bit more time ensuring that a default of 2048 doesn't break 
anything on older JDK's etc.

> Knox Jetty server is vulnerable to Logjam vulnerability
> -------------------------------------------------------
>
>                 Key: KNOX-566
>                 URL: https://issues.apache.org/jira/browse/KNOX-566
>             Project: Apache Knox
>          Issue Type: Bug
>    Affects Versions: 0.5.0
>         Environment: Red Hat Enterprise Linux Server release 6.4 (Santiago)
>            Reporter: Jeffrey E  Rodriguez
>             Fix For: 0.7.0
>
>
> See description of logjam
> "The Logjam Attack"
> https://weakdh.org/
> To test you should do:
> [root@bdvs1392 logs]# openssl s_client -connect bdvs1392.svl.ibm.com:8443 
> -cipher "EDH" | grep "Server Temp Key"
> depth=0 C = US, ST = Test, L = Test, O = Hadoop, OU = Test, CN = 
> bdvs1392.svl.ibm.com
> verify error:num=18:self signed certificate
> verify return:1
> depth=0 C = US, ST = Test, L = Test, O = Hadoop, OU = Test, CN = 
> bdvs1392.svl.ibm.com
> verify return:1
> Server Temp Key: DH, 768 bits
> The key should >= 1024



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to