You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@directory.apache.org by "Emmanuel Lecharny (JIRA)" <ji...@apache.org> on 2015/06/30 21:22:04 UTC

[jira] [Comment Edited] (DIRSERVER-2078) High Security Vulnerabilities Found when using LDAPs

    [ https://issues.apache.org/jira/browse/DIRSERVER-2078?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14608673#comment-14608673 ] 

Emmanuel Lecharny edited comment on DIRSERVER-2078 at 6/30/15 7:21 PM:
-----------------------------------------------------------------------

FTR, we have added two attributes in the configuration that allows you to limit the protocols and ciphers to use : {{ads-enabledCiphers:}} and {{ads-enabledProtocols}}

Here is an example of configuration (although the ciphers in this example are just placeholders) :
{code}
dn: ads-transportid=ldaps,ou=transports,ads-serverId=ldapServer,ou=servers,ads-directoryServiceId=default,ou=config
ads-systemport: 10636
ads-transportenablessl: true
ads-transportaddress: localhost
ads-transportid: ldaps
ads-needClientAuth: false
ads-wantClientAuth: true
ads-enabledCiphers: AAA
ads-enabledCiphers: BBB
ads-enabledCiphers: CCC
ads-enabledCiphers: DDD
ads-enabledProtocols: TLSv1
ads-enabledProtocols: TLSv1.1
ads-enabledProtocols: TLSv1.2
objectclass: ads-transport
objectclass: ads-tcpTransport
objectclass: top
ads-enabled: true
{code}

You can decide to inject the exact TLS protocol version and ciphers you want the server to support.


was (Author: elecharny):
FTR, we have added two attributes in the configuration that allows you to limit the protocols and ciphers to use : {{

Here is an example of configuration (although the ciphers in this example are just placeholders) :
{code}
dn: ads-transportid=ldaps,ou=transports,ads-serverId=ldapServer,ou=servers,ads-directoryServiceId=default,ou=config
ads-systemport: 10636
ads-transportenablessl: true
ads-transportaddress: localhost
ads-transportid: ldaps
ads-needClientAuth: false
ads-wantClientAuth: true
ads-enabledCiphers: AAA
ads-enabledCiphers: BBB
ads-enabledCiphers: CCC
ads-enabledCiphers: DDD
ads-enabledProtocols: TLSv1
ads-enabledProtocols: TLSv1.1
ads-enabledProtocols: TLSv1.2
objectclass: ads-transport
objectclass: ads-tcpTransport
objectclass: top
ads-enabled: true
{code}

You can decide to inject the exact TLS protocol version and ciphers you want the server to support.

> High Security Vulnerabilities Found when using LDAPs
> ----------------------------------------------------
>
>                 Key: DIRSERVER-2078
>                 URL: https://issues.apache.org/jira/browse/DIRSERVER-2078
>             Project: Directory ApacheDS
>          Issue Type: Bug
>          Components: ldap
>    Affects Versions: 2.0.0-M20
>         Environment: Server 2008 R2, Java 8
>            Reporter: Tyler Neemann
>              Labels: security
>         Attachments: Anonymous.JPG, ClearText.JPG, FREAK.JPG
>
>
> Recent internal Qualys vulnerability scans are reporting High Security vulnerabilities when using LDAPs. I have searched through the documentation and cannot find any remediation to these issues. 
> Currently have LDAPs enabled, TLS enabled and Server Side password hashing enabled. Allow anonymous access is disabled
> Issues found
> 1. SSL/TLS Server Factoring RSA Export Keys (FREAK) vulnerability
> 2. SSL Server Allows Anonymous Authentication Vulnerability
> 3. SSL Server Allows Cleartext Communication Vulnerability
> Any help would be appreciated. 



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)