WebSphere Application Server & Liberty

WebSphere Application Server & Liberty

Join this online group to communicate across IBM product users and experts by sharing advice and best practices with peers and staying up to date regarding product enhancements.

 View Only

IBM HTTP Server, Transport Layer Security and Google Chrome

By Dave Hay posted Fri May 29, 2015 04:05 PM

  

On my current project, we have a requirement that we're using Transport Layer Security (TLS) 1.2 to encrypt connections "over the wire".

Therefore, I started digging into the configuration for the web server component of our infrastructure ( IBM HTTP Server 8.5.5.5 ).

This page was immensely useful in this regard: -

IBM HTTP SSL Server Questions and Answers

This is what I initially had in httpd.conf : -

...
ServerName bpm856.uk.ibm.com:8080
LoadModule ibm_ssl_module modules/mod_ibm_ssl.so
Listen 8443

SSLProtocolDisable SSLv2 SSLv3 TLSv10 TLSv11
SSLEnable

KeyFile /opt/IBM/HTTPServer/ssl/keystore.kdb
SSLDisable
...

However, when I tested the connection using Chrome 43.0.2357.81, this is what I saw: -



To quote: -

Your connection to bam856.uk.ibm.com is encrypted with obsolete cryptography.

The connection uses TLS 1.2.

The connection is encrypted and authenticated using AES_128_GCM and uses RSA as the key exchange mechanism.

I did some digging about, and found this post on StackExchange: -

Google Chrome “Your connection to website is encrypted with obsolete cryptography”

which said, in part: -

...
Your exact case is that RSA is used as the key exchange mechanism. Instead, you should use DHE_RSA or ECDHE_RSA.

To remove the 'obsolete' requirement, you'll need to get 'modern' cryptography which is defined as:

    TLS 1.2 or QUIC (protocol)
    AES_128_GCM or CHACHA20_POLY1305 (cipher)
    DHE_RSA or ECDHE_RSA or ECDHE_ECDSA (key exchange).
...

Reading through the aforementioned IHS Q&A, I found this: -

Does IHS support perfect forward secrecy (PFS)?

...
 IHS 8.0.0.6/8.5.0.2 and later support ECDHE ciphers and keys. These ciphers provide PFS, but must be manually enabled through the SSLCipherSpec directive.

Note that IHS cannot switch between an RSA and ECDSA certificate based on client capabilities, and most generally available clients don't support ECDSA, so ECDHE-ECDSA ciphers should be used with care.

Example configurations:

        #Allow ECDHE-RSA ciphers, but do not prefer them
        SSLCipherSpec TLSv12 +TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
        SSLCipherSpec TLSv12 +TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
        SSLCipherSpec TLSv12 +TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
        SSLCipherSpec TLSv12 +TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
...

Using this, I amended my httpd.conf as follows: -

...
ServerName bpm856.uk.ibm.com:8080
LoadModule ibm_ssl_module modules/mod_ibm_ssl.so
Listen 8443

SSLProtocolDisable SSLv2 SSLv3 TLSv10 TLSv11
SSLCipherSpec ALL NONE
SSLCipherSpec TLSv12 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
SSLCipherSpec TLSv12 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
SSLCipherSpec TLSv12 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
SSLCipherSpec TLSv12 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
SSLCipherSpec ALL TLS_RSA_WITH_AES_128_GCM_SHA256
SSLCipherSpec ALL TLS_RSA_WITH_AES_256_GCM_SHA384
SSLCipherSpec ALL TLS_RSA_WITH_AES_128_CBC_SHA256
SSLCipherSpec ALL TLS_RSA_WITH_AES_256_CBC_SHA256
SSLCipherSpec ALL TLS_RSA_WITH_AES_128_CBC_SHA
SSLCipherSpec ALL TLS_RSA_WITH_AES_256_CBC_SHA
SSLCipherSpec ALL SSL_RSA_WITH_3DES_EDE_CBC_SHA
SSLEnable
...

and now, after a restart, Chrome is happy with IHS: -



Your connection to bam856.uk.ibm.com is encrypted with modern cryptography.

The connection uses TLS 1.2.

The connection is encrypted and authenticated using AES_128_GCM and uses ECDHE_RSA as the key exchange mechanism.

Obviously I do need to remember the point that the Q&A made: -

...
 Note that IHS cannot switch between an RSA and ECDSA certificate based on client capabilities, and most generally available clients don't support ECDSA, so ECDHE-ECDSA ciphers should be used with care.
...

so I'll review this with my client's security team.

0 comments
18 views

Permalink