How to disable SHA1 and CBC mode cipher encryption.

book

Article ID: 191818

calendar_today

Updated On:

Products

CA Virtual Privilege Manager CA Privileged Identity Management Endpoint (PIM)

Issue/Introduction

VA finding on port 8161 ActiveMQ

SSL Medium Strength Cipher Suites Supported (SWEET32)

The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite.

Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same physical network.

Please advise how to disable SHA1 and CBC mode cipher encryption and enable CTR or GCM cipher mode encryption.

Cause

This is a Vulnerability.

Environment

Release : 14.0 and 14.1

Component : CA ControlMinder / PAMSC Server

Resolution

Follow these steps to mitigate the SWEETY32 attack.

Pre-requisite : jdk 1.8 version

1) Navigate to folder(or similar) C:\jdk1.8.0\jre\lib\security

2) Open java.security

3) edit the line that contains "jdk.tls.disabledAlgorithms"

4) Merge these values to existing ones "SSLv3, DES, DESede, RC4, MD5withRCA"

5) Restart ActiveMQ service and Web Server