Alexey Serbin created KUDU-2983:
-----------------------------------

             Summary: webserver: remove TLS ciphers with RSA-based key exchange
                 Key: KUDU-2983
                 URL: https://issues.apache.org/jira/browse/KUDU-2983
             Project: Kudu
          Issue Type: Improvement
          Components: master, security, tserver
    Affects Versions: 1.11.0
            Reporter: Alexey Serbin


Since squeasel now supports ECDH-based algorithms since  
[d6a6b54b1|https://github.com/apache/kudu/commit/d6a6b54b175032c7d13d231ef6d156ef9d0e3ab0],
 it's safe to remove ciphers with key exchange based on RSA for Kudu embedded 
webserver on every supported platform but CentOS6 (there we use 
{{openssl-el6-workaround}} defining {{OPENSSL_NO_ECDH}}).

That's to follow [best 
practices|https://wiki.mozilla.org/Security/Server_Side_TLS] of using only 
forward secrecy-enabled ciphers.  As of October 2019, let's use at least 
_Intermediate compatibility_ cipher list (needs to be accommodated for CentOS7 
since polynomial algos sometimes not available there).

Also, that's to avoid security scan tools like [Qualys SSL Server 
Test|https://www.ssllabs.com/ssltest/] from SSL Labs issuing warnings about 
critical vulnerabilities such as [RobotAttack|https://robotattack.org/].  See 
[this introduction 
article|https://www.trustzone.com/the-robot-attack-rsa-encryption-is-vulnerable-choose-ecc-in-tls-ssl-certificates-to-ensure-security/]
 for more context on replacing RSA with ECC for TLS key exchange.

The issue to remove ciphers with RSA-based key exchange for Kudu RPC is tracked 
separately since it requires changing type of IPKI private key as well.

This is the list of ciphers to use on CentOS7 and newer for Kudu webserver:
{noformat}
ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384
{noformat}





--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to