[ 
https://issues.apache.org/activemq/browse/AMQ-2384?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=58565#action_58565
 ] 

Phil Pickett commented on AMQ-2384:
-----------------------------------

Gary, I've added a couple mods to the SslTransportServer.java class and created 
a new 5.3-based patch (SSLEnableCiphers.patch) containing these along your 
changes.  With the resulting activemq-core-5.3.0.jar and transportConnect:

            <transportConnector name="openwire" 
uri="ssl://0.0.0.0:61616?transport.enabledCipherSuites=SSL_RSA_WITH_RC4_128_MD5,SSL_RSA_WITH_RC4_128_SHA,SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA"/>

I am able to disable low ciphers.

> The activeMQ port supports low and medium strength ciphers 
> -----------------------------------------------------------
>
>                 Key: AMQ-2384
>                 URL: https://issues.apache.org/activemq/browse/AMQ-2384
>             Project: ActiveMQ
>          Issue Type: Bug
>          Components: Connector
>    Affects Versions: 5.2.0
>         Environment: We are running the ActiveMQ 5.2.0  over a SLES 11 64 bit 
>  machine. In the configuration file activemq.xml there is no way to specify 
> the supported ciphers. 
>            Reporter: Shrisha Chandrashekar
>             Fix For: 5.4.0
>
>         Attachments: setSslSocketOptions.patch, SSLEnableCiphers.patch
>
>
> On running a Tenable nessus scan against the machine where ActiveMQ is 
> running, we see that the port 61616 , the TCP connector port accepts Low and 
> Medium strength ciphers by default. This may be a security risk and therefore 
> we need a way to specify which ciphers to support.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to