-
Notifications
You must be signed in to change notification settings - Fork 428
Closed
Description
When mounting this custom configuration file on /etc/rabbitmq/rabbitmq.config
:
[
{rabbit, [
{loopback_users, []},
{ssl_listeners, [5671]},
{ssl_options, [
{cacertfile,"/etc/rabbitmq/testca/cacert.pem"},
{certfile,"/etc/rabbitmq/server/cert.pem"},
{keyfile,"/etc/rabbitmq/server/key.pem"},
{verify,verify_peer},
{fail_if_no_peer_cert,false}
]},
{tcp_listeners, [
{"0.0.0.0", 5672}
]}
]}
].
The rabbitmq container log outputs the following warning:
=ERROR REPORT==== 3-Feb-2015::16:41:33 ===
The installed version of Erlang (R15B01) contains the bug OTP-10905,
which makes it impossible to disable SSLv3. This makes the system
vulnerable to the POODLE attack. SSL listeners for AMQP have therefore
been disabled.
You are advised to upgrade to a recent Erlang version; R16B01 is the
first version in which this bug is fixed, but later is usually
better.
If you cannot upgrade now and want to re-enable SSL listeners, you can
set the config item 'ssl_allow_poodle_attack' to 'true' in the
'rabbit' section of your configuration file.
I can get the Dockerfile to install an updated Erlang version.
Metadata
Metadata
Assignees
Labels
No labels