[ 
https://issues.apache.org/jira/browse/NIFI-1480?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17863911#comment-17863911
 ] 

Shawn Dorsch edited comment on NIFI-1480 at 7/8/24 7:46 PM:
------------------------------------------------------------

We're looking for a way to limit the TLS cipher suites used by 
HandleHttpRequest processor or the ListenHTTP processor, so this is still 
relevant. (y)


was (Author: JIRAUSER292400):
(y)

> Allow different cipher suites configurable properties for NiFi UI & 
> integrations
> --------------------------------------------------------------------------------
>
>                 Key: NIFI-1480
>                 URL: https://issues.apache.org/jira/browse/NIFI-1480
>             Project: Apache NiFi
>          Issue Type: Improvement
>          Components: Core Framework
>    Affects Versions: 0.5.0
>            Reporter: Andy LoPresto
>            Assignee: Andy LoPresto
>            Priority: Major
>              Labels: certificate, security, tls
>
> Currently NiFi uses the same collection of TLS cipher suites for both its 
> role as a server and outgoing connections (i.e. {{GetHTTP}} or {{InvokeHTTP}} 
> processors, etc.). This collection is not customizable or modifiable by end 
> users. 
> Extract these values from the application to be configurable, provide 
> sensible defaults, and decouple the roles so they can be set independently 
> (i.e. more restrictive and stronger cipher suites for NiFi as a server, but 
> allowing weaker/fallback cipher suites for external connections to a legacy 
> resource). 
> [Mozilla TLS Configuration 
> Tool|https://mozilla.github.io/server-side-tls/ssl-config-generator/]
> [Mozilla TLS Configuration 
> Wiki|https://wiki.mozilla.org/Security/Server_Side_TLS]



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to