Nice! On 2022-11-17, 6:23 AM, "Frank Crow" <fjcrow2...@gmail.com> wrote:
CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you can confirm the sender and know the content is safe. Hey Lucas, I tried that on a development VM this morning and that (the namedGroups) worked perfectly! For my requirements, I only need FIPS-approved and 384-bit or better, so something as simple as: export ACTIVEMQ_OPTS='-Djdk.tls.namedGroups=secp384r1' Covers the requirement. Reading around the net regarding EC, I think I'll also include secp521r1 but that's about it. At least until FIPS 140-3 kicks in. Thanks! -Frank On Wed, Nov 16, 2022 at 1:04 PM Frank Crow <fjcrow2...@gmail.com> wrote: > Hey Lucas, > > I'll definitely give that a try. Thanks! > > -Frank > > > On Wed, Nov 16, 2022 at 12:14 PM Tetreault, Lucas > <tetlu...@amazon.com.invalid> wrote: > >> Hey Frank, >> >> There are loads of configuration options available, e.g.: >> https://www.java.com/en/configure_crypto.html >> >> You should be able to enable only specific curves ( >> https://www.java.com/en/configure_crypto.html#DisablenonNIST) using >> something like: >> >> export ACTIVEMQ_OPTS='-Djdk.tls.namedGroups="secp256r1, secp384r1, >> secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, >> sect571r1, secp256k1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, >> ffdhe8192"' >> >> Hopefully that helps! >> >> Lucas >> >> On 2022-11-16, 9:31 AM, "Justin Bertram" <jbert...@apache.org> wrote: >> >> CAUTION: This email originated from outside of the organization. Do >> not click links or open attachments unless you can confirm the sender and >> know the content is safe. >> >> >> >> Do you have a clear idea of what you would change if you forked >> ActiveMQ >> "Classic"? If so, you could send that change as a PR, and it could >> potentially be incorporated into the next release. Given what you've >> observed regarding Java's SSLServerSocket and SSLParameters it seems >> like >> the JDK doesn't provide applications with any options here. It's not >> clear >> what the broker might do to support your use-case. >> >> If BouncyCastle provides the configuration you need can you not >> integrate >> BouncyCastle with the broker's JVM as the security provider? >> >> If using ActiveMQ Artemis is an option for you it provides >> integration with >> OpenSSL so if you can configure what you need in OpenSSL then that >> also may >> be a possibility for you. >> >> >> Justin >> >> On Wed, Nov 16, 2022 at 9:42 AM Frank Crow <fjcrow2...@gmail.com> >> wrote: >> >> > Yeah, I'm pretty familiar with the javax.net.ssl package, related >> system >> > properties, security providers and their configurations. I'm also >> > familiar with other middleware products that offer a specific >> configuration >> > item for elliptic curves (e.g., PostgreSQL, OpenSSL, etc.). I'm >> fairly >> > confident that, unless I fork ActiveMQ and implement that myself, >> there is >> > no external configuration, property or even bean that I could add >> to make >> > it happen. >> > >> > Looking at the ActiveMQ "SSL Transport Reference" we see that such >> > *transport >> > *options are passed to SSLServerSocket which, if you read through >> the >> > Javadoc, is really handled by the SSLParameters and even that has >> zero >> > provision for ECDH parameters. Many products that support very >> granular >> > encryption configuration do so via 3rd party libraries such as >> > BouncyCastle. >> > >> > So, I think that, unless anyone knows differently, ActiveMQ does not >> > support what I'm looking for by any means. >> > >> > Thanks, >> > Frank >> > >> > >> > On Tue, Nov 15, 2022 at 7:07 PM Justin Bertram <jbert...@apache.org >> > >> > wrote: >> > >> > > The broker delegates all this work to the JVM in the first place >> so I >> > think >> > > you're more likely to find what you're looking for in the JVM >> directly. >> > > Even the value for the "transport.enabledCipherSuites" parameter >> is >> > passed >> > > through to the underlying SSL implementation provided by the JVM. >> > > >> > > Have you investigated this from the JVM's perspective? >> > > >> > > >> > > Justin >> > > >> > > On Tue, Nov 15, 2022 at 3:33 PM Frank Crow <fjcrow2...@gmail.com> >> wrote: >> > > >> > > > No because, the ability to specify cipher suites does not >> include any >> > way >> > > > to specify the specific type of elliptic curve. >> > > > >> > > > At the moment, the configuration that is in place is using the >> > > > ECDHE-RSA-AES256-GCM-SHA384 cipher. >> > > > >> > > > The ECDHE key exchange is apparently using P-256 by default. >> I need >> > it >> > > to >> > > > be stronger or I need to document that I am unable to change >> that >> > > > configuration item. >> > > > >> > > > >> > > > Thanks, >> > > > Frank >> > > > >> > > > >> > > > On Tue, Nov 15, 2022 at 4:21 PM Justin Bertram < >> jbert...@apache.org> >> > > > wrote: >> > > > >> > > > > Did you try using the "transport.enabledCipherSuites" >> parameter >> > > mentioned >> > > > > here [1]? >> > > > > >> > > > > >> > > > > Justin >> > > > > >> > > > > [1] https://activemq.apache.org/ssl-transport-reference >> > > > > >> > > > > On Tue, Nov 15, 2022 at 2:16 PM Frank Crow < >> fjcrow2...@gmail.com> >> > > wrote: >> > > > > >> > > > > > Hello all, >> > > > > > >> > > > > > Does anyone know if it is possible to specify which >> elliptic curve >> > > will >> > > > > be >> > > > > > used by the broker for ECDHE key exchanges? Currently I >> have TLS >> > > > enabled >> > > > > > and I'm seeing that it is using a 256-bit (P-256) elliptic >> curve. >> > I >> > > > > have >> > > > > > requirements for 384-bit elliptic curves or better. >> > > > > > >> > > > > > Is there some transport.option that I can use or is there >> some >> > other >> > > > > method >> > > > > > to configure the elliptic curve that ActiveMQ uses? >> > > > > > >> > > > > > >> > > > > > Thanks, >> > > > > > -- >> > > > > > Frank >> > > > > > >> > > > > >> > > > >> > > > >> > > > -- >> > > > Frank >> > > > >> > > >> > >> > >> > -- >> > Frank >> > >> >> > > -- > Frank > -- Frank