[
https://issues.apache.org/activemq/browse/AMQ-2384?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=58565#action_58565
]
Phil Pickett commented on AMQ-2384:
-----------------------------------
Gary, I've added a couple mods to the SslTransportServer.java class and created
a new 5.3-based patch (SSLEnableCiphers.patch) containing these along your
changes. With the resulting activemq-core-5.3.0.jar and transportConnect:
<transportConnector name="openwire"
uri="ssl://0.0.0.0:61616?transport.enabledCipherSuites=SSL_RSA_WITH_RC4_128_MD5,SSL_RSA_WITH_RC4_128_SHA,SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA"/>
I am able to disable low ciphers.
> The activeMQ port supports low and medium strength ciphers
> -----------------------------------------------------------
>
> Key: AMQ-2384
> URL: https://issues.apache.org/activemq/browse/AMQ-2384
> Project: ActiveMQ
> Issue Type: Bug
> Components: Connector
> Affects Versions: 5.2.0
> Environment: We are running the ActiveMQ 5.2.0 over a SLES 11 64 bit
> machine. In the configuration file activemq.xml there is no way to specify
> the supported ciphers.
> Reporter: Shrisha Chandrashekar
> Fix For: 5.4.0
>
> Attachments: setSslSocketOptions.patch, SSLEnableCiphers.patch
>
>
> On running a Tenable nessus scan against the machine where ActiveMQ is
> running, we see that the port 61616 , the TCP connector port accepts Low and
> Medium strength ciphers by default. This may be a security risk and therefore
> we need a way to specify which ciphers to support.
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.