Chapter 7. Disabling Weak Encryption
You might want to change the encryption settings for Satellite depending on the security requirements of your infrastructure or to fix vulnerabilities quickly. Use the following sections to disable weak SSL encryption and 64-bit cipher suites.
7.1. Disabling Weak SSL 2.0 and SSL 3.0 Encryption Copy linkLink copied to clipboard!
If your Satellite fails Nessus scans because of SSL vulnerabilities, or your security infrastructure requires that you disable SSL 2.0 and SSL 3.0, you can edit the /etc/foreman-installer/custom-hiera.yaml
file to remove weak encryption.
Disabling Weak SSL 2.0 and SSL 3.0 Encryption for Satellite
To disable weak encryption for Satellite, complete the following steps:
Open the
/etc/foreman-installer/custom-hiera.yaml
file for editing:vi /etc/foreman-installer/custom-hiera.yaml
# vi /etc/foreman-installer/custom-hiera.yaml
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Add the following entries:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Rerun the
satellite-installer
tool with no arguments:satellite-installer --scenario satellite
# satellite-installer --scenario satellite
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Restart Katello services:
katello-service restart
# katello-service restart
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Disabling Weak SSL 2.0 and SSL 3.0 Encryption for Capsule
To disable weak encryption for Capsule, complete the following steps:
Open the
/etc/foreman-installer/custom-hiera.yaml
file for editing:vi /etc/foreman-installer/custom-hiera.yaml
# vi /etc/foreman-installer/custom-hiera.yaml
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Add the following entries:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Rerun the
satellite-installer
tool with no arguments:satellite-installer --scenario capsule
# satellite-installer --scenario capsule
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Restart Katello services:
katello-service restart
# katello-service restart
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
7.2. Disabling 64-bit Block Size Cipher Suites (SWEET32) Copy linkLink copied to clipboard!
If you want to update your cipher suites for Satellite, you can edit the ciphers and then add your changes to the /etc/foreman-installer/custom-hiera.yaml
file to make these changes persistent.
You can use the following procedure to update your cipher suite.
Until BZ#1586271 is resolved, you might want to disable SSL 64-bit Block Size Cipher Suites (SWEET32). However, you can also use this procedure to update other ciphers and make these changes persistent.
The minimum browser requirements for the following Ciphers is Firefox 27.
Open the
/etc/httpd/conf.d/ssl.conf
Apache configuration file for editing:vi /etc/httpd/conf.d/ssl.conf
# vi /etc/httpd/conf.d/ssl.conf
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Update the values of
SSLCipherSuite
parameter:SSLCipherSuite ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256
SSLCipherSuite ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Restart the httpd service:
systemctl restart httpd
# systemctl restart httpd
Copy to Clipboard Copied! Toggle word wrap Toggle overflow To make the change persistent across different satellite-installer executions, open the
/etc/foreman-installer/custom-hiera.yaml
file for editing:vi /etc/foreman-installer/custom-hiera.yaml
# vi /etc/foreman-installer/custom-hiera.yaml
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Add the following entry for
apache
:apache::mod::ssl::ssl_cipher: ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256
apache::mod::ssl::ssl_cipher: ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Run the
satellite-installer
tool to add the changes to the Apache configuration:satellite-installer -S satellite
# satellite-installer -S satellite
Copy to Clipboard Copied! Toggle word wrap Toggle overflow