Uploaded image for project: 'Ranger'
  1. Ranger
  2. RANGER-2131

Ranger UserSync port (ie 5151) supports TLSv1.0

Agile BoardAttach filesAttach ScreenshotVotersWatch issueWatchersCreate sub-taskLinkCloneUpdate Comment AuthorReplace String in CommentUpdate Comment VisibilityDelete Comments
    XMLWordPrintableJSON

Details

    • Bug
    • Status: Resolved
    • Major
    • Resolution: Fixed
    • 1.0.0
    • 1.1.0
    • usersync

    Description

      THREAT:
      TLS is capable of using a multitude of ciphers (algorithms) to create the public and private key pairs.
      For example if TLSv1.0 uses either the RC4 stream cipher, or a block cipher in CBC mode.
      RC4 is known to have biases and the block cipher in CBC mode is vulnerable to the POODLE attack.
      TLSv1.0, if configured to use the same cipher suites as SSLv3, includes a means by which a TLS implementation can downgrade the connection to
      SSL v3.0, thus weakening security.
      A POODLE-type (https://blog.qualys.com/ssllabs/2014/12/08/poodle-bites-tls) attack could also be launched directly at TLS without negotiating a
      downgrade.
      This QID will be marked as a Fail for PCI as of May 1st, 2017 in accordance with the new standards. For existing implementations, Merchants will
      be able to submit a PCI False Positive / Exception Request and provide proof of their Risk Mitigation and Migration Plan, which will result in a pass
      for PCI up until June 30th, 2018.
      Further details can be found at: NEW PCI DSS v3.2 and Migrating from SSL and Early TLS v1.1 (https://community.qualys.com/message/34120)
      IMPACT:
      An attacker can exploit cryptographic flaws to conduct man-in-the-middle type attacks or to decryption communications.
      For example: An attacker could force a downgrade from the TLS protocol to the older SSLv3.0 protocol and exploit the POODLE vulnerability, read
      secure communications or maliciously modify messages.
      A POODLE-type (https://blog.qualys.com/ssllabs/2014/12/08/poodle-bites-tls) attack could also be launched directly at TLS without negotiating a
      downgrade.
      SOLUTION:
      Disable the use of TLSv1.0 protocol in favor of a cryptographically stronger protocol such as TLSv1.2.
      The following openssl commands can be used
      to do a manual test:
      openssl s_client -connect ip:port -tls1
      If the test is successful, then the target support TLSv1

       

      Attachments

        Activity

          This comment will be Viewable by All Users Viewable by All Users
          Cancel

          People

            nikhil Nikhil Purbhe
            toopt4 t oo
            Votes:
            0 Vote for this issue
            Watchers:
            4 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved:

              Slack

                Issue deployment