Andy LoPresto created AMBARI-20545:
--------------------------------------

             Summary: Remove the use of legacy SSL and TLS protocol versions
                 Key: AMBARI-20545
                 URL: https://issues.apache.org/jira/browse/AMBARI-20545
             Project: Ambari
          Issue Type: Bug
          Components: ambari-server, security
    Affects Versions: 2.4.2
            Reporter: Andy LoPresto


I notice that the explicit enabling of various protocols still includes 
SSLv2Hello and SSLv3, which are severely broken protocols with numerous known 
vulnerabilities and not necessary for legacy compatibility. Even TLSv1 and 
TLSv1.1 have been [discouraged since February 
2014|https://community.qualys.com/thread/12421], when all modern browsers 
supported TLSv1.2. Is there any reason Ambari still needs to enable support for 
these legacy protocols, and are there any other mitigating controls put in 
place to prevent downgrade, brute force, padding oracle, and weak parameter 
attacks against these protocols? Thanks. 





--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

Reply via email to