Skip to content
This repository has been archived by the owner on Sep 11, 2024. It is now read-only.

Disable weak SSL #102

Closed
rubeon opened this issue Jun 9, 2016 · 11 comments
Closed

Disable weak SSL #102

rubeon opened this issue Jun 9, 2016 · 11 comments

Comments

@rubeon
Copy link

rubeon commented Jun 9, 2016

Hi, guys

Can the SSL configuration for OMS's network traffic be hardened without negatively affecting Azure's infrastructure communications? At the moment, it sets off vulnerability scanners with the following:

Negotiated with the following insecure cipher suites: SSL 3.0 ciphers: TLS_RSA_WITH_IDEA_CBC_SHATLS 1.0 ciphers: TLS_RSA_WITH_IDEA_CBC_SHATLS 1.1 ciphers: TLS_RSA_WITH_IDEA_CBC_SHATLS 1.2 ciphers: TLS_RSA_WITH_IDEA_CBC_SHA

Negotiated with the following insecure cipher suites: SSL 3.0 ciphers: TLS_RSA_WITH_RC4_128_MD5TLS_RSA_WITH_RC4_128_SHATLS 1.0 ciphers: TLS_RSA_WITH_RC4_128_MD5TLS_RSA_WITH_RC4_128_SHA TLS 1.1 ciphers: TLS_RSA_WITH_RC4_128_MD5 TLS_RSA_WITH_RC4_128_SHATLS 1.2 ciphers: TLS_RSA_WITH_RC4_128_MD5TLS_RSA_WITH_RC4_128_SHA

Would bit be possible to follow better security practices and disable weak ciphers?

  • disable SSL v3
  • disable DES and IDEA
  • disable support for RC4 ciphers.
  • Use only TLSv1.1+, as recommended by PCI-DSS?
@KrisBash
Copy link
Contributor

Hello. Thanks for reporting this issue. I'm happy to help out here, but can you clarify what target (and port) you are scanning? Is this the Linux agent?

@rubeon
Copy link
Author

rubeon commented Jun 17, 2016

Hi,

this is popping up on port 1270, which I believe is this agent.

[centos@hfd-cr-pweb1 ~]$ sudo netstat -tlupn|grep 1270
tcp 0 0 0.0.0.0:1270 0.0.0.0:* LISTEN 1204/omiserver

Thanks,
Eric

@jeffaco
Copy link
Contributor

jeffaco commented Jun 17, 2016

@rubeon That's very strange. I would not expect port 1270 to be exposed unless the Operations Manager client was previously installed on this machine.

If you edit file /etc/opt/omi/conf/omiserver.conf and change HTTPSPORT to 0, then the OMS agent will no longer listen on port 1270. You don't need OMS to be listening for external connections to collect data on the local system (unless you're using the Operations Manager client on the same system).

@KrisBash
Copy link
Contributor

Also, if you are using Operations Manager and require TCP port 1270, you can control ciphers and SSLv3 behavior in the omiserver.conf file. NoSSLV3 is a Boolean property to toggle SSLv3 support and sslciphersuite= allows you to specify a standard OpenSSL cipher suite list (like you would for Apache's mod_ssl).

@rubeon
Copy link
Author

rubeon commented Jun 19, 2016

Looks like this gets installed by the diagnostics extension in Azure. If Azure doesn't need this to be listening on port 1270, it should probably be disabled by default.

Thanks

@jeffaco
Copy link
Contributor

jeffaco commented Jun 19, 2016

The intent, when Azure installs the diagnostic extension, is that it is NOT listening on port 1270.

Thanks for raising this issue, I'll bring it up with the Azure folks.

@jeffaco
Copy link
Contributor

jeffaco commented Jun 30, 2016

I have committed the above fix, although the Azure team has opted to edit omiserver.conf themselves to not expose the port.

This problem should be fixed in an upcoming Azure agent release.

@jeffaco jeffaco closed this as completed Jun 30, 2016
@945870
Copy link

945870 commented Jan 12, 2018

I want to disable DES and 3DES sslCipherSuite in omiserver for port 1270 but it is not happening. I think, I didn't get proper syntax that used in omiserver.conf. Can anyone help me.
thanks.

@jeffaco
Copy link
Contributor

jeffaco commented Jan 12, 2018

The syntax for sslCipherSuite is identical to what the Apache HTTPD Server uses.

@945870
Copy link

945870 commented Jan 13, 2018 via email

@jeffaco
Copy link
Contributor

jeffaco commented Jan 16, 2018

Your message isn't clear to me at all, sorry:

  1. What is the EXACT line that you've added to omiserver.conf? The format of the line above is not correct.
  2. You say that you're trying to disable DES/3DES, and then when you try to test, OMI rejects. Isn't this correct?
  3. You say the same issue has been solved for port 443 by changing ssl.conf file. I'm not sure exactly what file you mean, but SSL doesn't drive port 443. Port 443 is an HTTPS port.

Finally, this repository isn't really the proper repository for OMI issues. Please open a new issue (with all questions above clearly addressed) to the OMI repository. That way, all of the OMI developers can chip in. I just happen to monitor the OMS issues, but OMS isn't the project I work on. Thanks for your understanding.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants