PIE-34054
Remove use of SSLv3 from any HTTPS or FTPS Integration Server
ports.
In order to protect against POODLE vulnerability
(CVE-2014-3566),this fix removes the use of SSLv3.0 from
Integration Server HTTPS and FTPS ports. This is done using the
following two new server configuration parameters.
- watt.net.ssl.server.handshake.minVersion
- watt.net.ssl.server.handshake.maxVersion
The values for these server configuration parameters are
“sslv3” and “tls” (the default). In this fix, these two
parameters take the default value “tls”, which indicates that
all server side SSL listeners will support only TLSv1 and no
longer accept SSLv3 connections.
When Integration Server acts as a client and makes an outbound
request,it configures the allowed protocols using the following
server configuration parameters:
- watt.net.ssl.client.handshake.minVersion=sslv2
- watt.net.ssl.client.handshake.maxVersion=tls
Possible values for these server configuration parameters are
“sslv2”,“sslv3”, and “tls”. If you want to disable the use of
“sslv3”, set watt.net.ssl.client.handshake.minVersion as
follows:
watt.net.ssl.client.handshake.minVersion=tls
To change the values of the parameters, from Integration Server
Administrator, navigate to Settings > Extended and add the
parameters as follows:
- watt.net.ssl.server.handshake.minVersion=tls
- watt.net.ssl.server.handshake.maxVersion=tls
- watt.net.ssl.client.handshake.minVersion=tls
- watt.net.ssl.client.handshake.maxVersion=tls
If any of your clients need to connect using SSLv3
(the previous default),
set watt.net.ssl.server.handshake.minVersion as follows:
watt.net.ssl.server.handshake.minVersion=sslv3
When making outbound connections, you can configure Integration
Server to first try to connect using sslv3 and, if that fails,
to connect with tlsv1. To do so,
set watt.net.ssl.client.handshake.minVersion as follows:
watt.net.ssl.client.handshake.minVersion=sslv3
This will allow Integration Server to use sslv3 with endpoints
that do not support tlsv1.