Note: This requires a service restart. Ensure the environment has a backup before proceeding.
On all vRealize Automation VAs:
Change #1
- For Port 443 (vRA core services), edit the file /etc/haproxy/conf.d/20-vcac.cfg.
- Change:
frontend https-in
log 127.0.0.1 local0 debug
bind 0.0.0.0:80
bind 0.0.0.0:443 ssl crt /etc/apache2/server.pem ciphers !aNULL:!eNULL:kECDH+AESGCM:ECDH+AESGCM:RSA+AESGCM:kECDH+AES:ECDH+AES:RSA+AES:@STRENGTH no-sslv3 no-tlsv10 no-tlsv11
To:
frontend https-in
log 127.0.0.1 local0 debug
bind 0.0.0.0:80
bind 0.0.0.0:443 ssl crt /etc/apache2/server.pem ciphers !aNULL:!eNULL:kECDH+AESGCM:ECDH+AESGCM:kECDH+AES:ECDH+AES:@STRENGTH no-sslv3 no-tlsv10 no-tlsv11
- Save the file.
- Run the command service haproxy restart.
Change #2
- For port 5480 (VAMI), edit the file /opt/vmware/etc/lighhtpd/lighttpd.conf.
- set the "ssl.cipher-list" parameter at the bottom of the file as:
ssl.cipher-list = "!aNULL:!eNULL:kECDH+AESGCM:ECDH+AESGCM:kECDH+AES:ECDH+AES:@STRENGTH no-sslv3 no-tlsv10 no-tlsv11"
- Save the file.
- Run the command vami-lighttp restart.
Change #3
- For port 8443 (vIDM Management), edit the file /opt/vmware/horizon/workspace/conf/catalina.properties.
- set the "nio-ssl.cipher.list" line towards the bottom of the file as follows:
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
- Save the file.
- Run the command service horizon-workspace restart.
- Run the command service elasticsearch restart.
On all vRealize Automation IaaS-Web Nodes:
To edit The cipher list to:
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P256,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P384,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P384,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P384,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P256,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P384,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P384,TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_256_CBC_SHA,TLS_DHE_DSS_WITH_AES_128_CBC_SHA,TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHAFollow these steps:
- Open the Group Policy Editor (gpedit.msc).
- On the left hand side, navigate to Computer Configuration > Administrative Templates > Network.
- Click on SSL Configuration Settings.
- On the right hand side, select/open SSL Cipher Suite Order.
Note: By default, the Not Configured option is set, but this may be different.
- Click on the Enabled button to edit your server’s Cipher Suites:
The SSL Cipher Suites field will fill with text once you click the button. If you want to see what Cipher Suites your server is currently offering, copy the text from the SSL Cipher Suites field and paste it into a text editor to review.
The text is one long, unbroken string, with cypher options are separated by a comma. The list cannot be longer than 1,023 characters.
- Copy the provided cipher list for vRA IaaS machines and paste it into the SSL Cipher Suites field.
- Click OK.
- Reboot the machine.
Validation
Verify through a scanner or by other means the VAs and IaaS nodes on the port changes are made.
Note: Resultset of supported cipher should be similar but might not be exact from this list:
Supported Server Cipher(s):
Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256result with sslscan over VA machine:443
Supported Server Cipher(s):
Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256