Uploaded image for project: 'Apache Cassandra'
  1. Apache Cassandra
  2. CASSANDRA-13325

Bring back the accepted encryption protocols list as configurable option

    XMLWordPrintableJSON

Details

    • Improvement
    • Status: Resolved
    • Low
    • Resolution: Fixed
    • 4.0-beta4, 4.0
    • Local/Config
    • None

    Description

      With CASSANDRA-10508, the hard coded list of accepted encryption protocols was eliminated. For some use cases, it is necessary to restrict the encryption protocols used for communication between client and server. Default JVM way of negotiations allows the best encryption protocol that client can use.
      e.g. I have set Cassandra to use encryption. Ideally client and server negotiate to use best protocol (TLSv1.2). But a malicious client might force TLSv1.0 which is susceptible to POODLE attacks.

      At the moment only way to restrict the encryption protocol is using the jdk.tls.client.protocols systems property. If I dont have enough access to modify this property, I dont have any way of restricting the encryption protocols.

      I am proposing bring back the accepted_protocols property but make it configurable. If not specified, let the JVM take care of the TLS negotiations.

      Attachments

        1. trunk.diff
          5 kB
          Nachiket Patil

        Activity

          People

            jmeredithco Jon Meredith
            nachiket_patil Nachiket Patil
            Jon Meredith
            Berenguer Blasi, David Capwell, Dinesh Joshi
            Votes:
            2 Vote for this issue
            Watchers:
            8 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved:

              Time Tracking

                Estimated:
                Original Estimate - Not Specified
                Not Specified
                Remaining:
                Remaining Estimate - 0h
                0h
                Logged:
                Time Spent - 2h
                2h