[ 
https://issues.apache.org/jira/browse/DIRSERVER-2078?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14608673#comment-14608673
 ] 

Emmanuel Lecharny edited comment on DIRSERVER-2078 at 6/30/15 7:21 PM:
-----------------------------------------------------------------------

FTR, we have added two attributes in the configuration that allows you to limit 
the protocols and ciphers to use : {{ads-enabledCiphers:}} and 
{{ads-enabledProtocols}}

Here is an example of configuration (although the ciphers in this example are 
just placeholders) :
{code}
dn: 
ads-transportid=ldaps,ou=transports,ads-serverId=ldapServer,ou=servers,ads-directoryServiceId=default,ou=config
ads-systemport: 10636
ads-transportenablessl: true
ads-transportaddress: localhost
ads-transportid: ldaps
ads-needClientAuth: false
ads-wantClientAuth: true
ads-enabledCiphers: AAA
ads-enabledCiphers: BBB
ads-enabledCiphers: CCC
ads-enabledCiphers: DDD
ads-enabledProtocols: TLSv1
ads-enabledProtocols: TLSv1.1
ads-enabledProtocols: TLSv1.2
objectclass: ads-transport
objectclass: ads-tcpTransport
objectclass: top
ads-enabled: true
{code}

You can decide to inject the exact TLS protocol version and ciphers you want 
the server to support.


was (Author: elecharny):
FTR, we have added two attributes in the configuration that allows you to limit 
the protocols and ciphers to use : {{

Here is an example of configuration (although the ciphers in this example are 
just placeholders) :
{code}
dn: 
ads-transportid=ldaps,ou=transports,ads-serverId=ldapServer,ou=servers,ads-directoryServiceId=default,ou=config
ads-systemport: 10636
ads-transportenablessl: true
ads-transportaddress: localhost
ads-transportid: ldaps
ads-needClientAuth: false
ads-wantClientAuth: true
ads-enabledCiphers: AAA
ads-enabledCiphers: BBB
ads-enabledCiphers: CCC
ads-enabledCiphers: DDD
ads-enabledProtocols: TLSv1
ads-enabledProtocols: TLSv1.1
ads-enabledProtocols: TLSv1.2
objectclass: ads-transport
objectclass: ads-tcpTransport
objectclass: top
ads-enabled: true
{code}

You can decide to inject the exact TLS protocol version and ciphers you want 
the server to support.

> High Security Vulnerabilities Found when using LDAPs
> ----------------------------------------------------
>
>                 Key: DIRSERVER-2078
>                 URL: https://issues.apache.org/jira/browse/DIRSERVER-2078
>             Project: Directory ApacheDS
>          Issue Type: Bug
>          Components: ldap
>    Affects Versions: 2.0.0-M20
>         Environment: Server 2008 R2, Java 8
>            Reporter: Tyler Neemann
>              Labels: security
>         Attachments: Anonymous.JPG, ClearText.JPG, FREAK.JPG
>
>
> Recent internal Qualys vulnerability scans are reporting High Security 
> vulnerabilities when using LDAPs. I have searched through the documentation 
> and cannot find any remediation to these issues. 
> Currently have LDAPs enabled, TLS enabled and Server Side password hashing 
> enabled. Allow anonymous access is disabled
> Issues found
> 1. SSL/TLS Server Factoring RSA Export Keys (FREAK) vulnerability
> 2. SSL Server Allows Anonymous Authentication Vulnerability
> 3. SSL Server Allows Cleartext Communication Vulnerability
> Any help would be appreciated. 



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to