Chapter 4. Updating the list of ciphers Directory Server supports
To establish an encrypted connection, both Directory Server and the client need at least one common cipher. For example, if a legacy application requires a cipher that is not enabled by default in Directory Server, you can enable it.
4.1. The difference between default ciphers and available ciphers Copy linkLink copied to clipboard!
Instead of listing individual ciphers in the configuration, you can use one of the following keywords in the nsSSL3Ciphers parameter:
default: Refers to the default ciphers enabled in the network security services (NSS). To display the list, enter:/usr/lib64/nss/unsupported-tools/listsuites | grep -B1 --no-group-separator "Enabled"
# /usr/lib64/nss/unsupported-tools/listsuites | grep -B1 --no-group-separator "Enabled"Copy to Clipboard Copied! Toggle word wrap Toggle overflow The
defaultkeyword is the default value of thensSSL3Ciphersparameter.all: Refers to all supported ciphers in Directory Server. To display the list, enter:dsconf -D "cn=Directory Manager" ldap://server.example.com security ciphers list --supported
# dsconf -D "cn=Directory Manager" ldap://server.example.com security ciphers list --supportedCopy to Clipboard Copied! Toggle word wrap Toggle overflow Use the
allkeyword when you want to enable only specific ciphers. For example, settingnsSSL3Ciphersto-all,+TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384configures Directory Server to disable all ciphers and enable onlyTLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384.
4.2. Weak ciphers Copy linkLink copied to clipboard!
By default, Directory Server rejects weak ciphers and you must configure Directory Server to support them.
Ciphers are considered weak, if:
They are exportable.
Exportable ciphers are labeled
EXPORTin the cipher name. For example, inTLS_RSA_EXPORT_WITH_RC4_40_MD5.They are symmetrical and weaker than the
3DESalgorithm.Symmetrical ciphers use the same cryptographic keys for both encryption and decryption.
- The key length is shorter than 128 bits.
4.3. Setting ciphers Directory Server supports using the command line Copy linkLink copied to clipboard!
To update the list of supported ciphers in Directory Server, update the nsSSL3Ciphers parameter.
Prerequisites
- You enabled TLS encryption in Directory Server.
Procedure
Display the list of enabled ciphers:
dsconf -D "cn=Directory Manager" ldap://server.example.com security ciphers list --enabled
# dsconf -D "cn=Directory Manager" ldap://server.example.com security ciphers list --enabledCopy to Clipboard Copied! Toggle word wrap Toggle overflow If you need to enable weak ciphers, enter:
dsconf -D "cn=Directory Manager" ldap://server.example.com security set --allow-insecure-ciphers on
# dsconf -D "cn=Directory Manager" ldap://server.example.com security set --allow-insecure-ciphers onCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the
nsSSL3Ciphersparameter. For example, to enable only theTLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384andTLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384ciphers, enter:dsconf -D "cn=Directory Manager" ldap://server.example.com security ciphers set -- "-all,+TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,+TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384"
# dsconf -D "cn=Directory Manager" ldap://server.example.com security ciphers set -- "-all,+TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,+TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384"Copy to Clipboard Copied! Toggle word wrap Toggle overflow Use
--to avoid that the shell interprets the-character in-allas an option to the command. Do not use a\character to escape-allbecause it can create an error and this results in a different cipher selection.Restart the instance:
dsctl instance_name restart
# dsctl instance_name restartCopy to Clipboard Copied! Toggle word wrap Toggle overflow
Verification
Display the list of enabled ciphers:
dsconf -D "cn=Directory Manager" ldap://server.example.com security ciphers list
# dsconf -D "cn=Directory Manager" ldap://server.example.com security ciphers list default +TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 +TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384Copy to Clipboard Copied! Toggle word wrap Toggle overflow
4.4. Setting ciphers Directory Server supports using the web console Copy linkLink copied to clipboard!
You can configure the cipher settings in the Cipher Preferences menu of the Directory Server web console.
Prerequisites
- You enabled TLS encryption in Directory Server.
- You are logged in to the instance in the web console.
Procedure
If you need to enable weak ciphers:
-
Navigate to
. -
Select
Allow Weak Ciphers. -
Click
Save Settings.
-
Navigate to
-
Navigate to
. Update the cipher settings. For example, to enable only the
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384andTLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384ciphers:-
Select
No Ciphersin theCipher Suitefield. -
Enter
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384in theAllow Specific Ciphersfield.
-
Select
- Click .
-
Click
.
Verification
-
Navigate to
. The Enabled Cipherslist displays the ciphers that are enabled.