Este contenido no está disponible en el idioma seleccionado.
Chapter 4. Updating the list of ciphers Directory Server supports
To establish an encrypted connection, both Directory Server and the client need at least one common cipher. For example, if a legacy application requires a cipher that is not enabled by default in Directory Server, you can enable it.
4.1. The difference between default ciphers and available ciphers Copiar enlaceEnlace copiado en el portapapeles!
Instead of listing individual ciphers in the configuration, you can use one of the following keywords in the nsSSL3Ciphers parameter:
default: Refers to the default ciphers enabled in the network security services (NSS). To display the list, enter:# /usr/lib64/nss/unsupported-tools/listsuites | grep -B1 --no-group-separator "Enabled"The
defaultkeyword is the default value of thensSSL3Ciphersparameter.all: Refers to all supported ciphers in Directory Server. To display the list, enter:# dsconf -D "cn=Directory Manager" ldap://server.example.com security ciphers list --supportedUse the
allkeyword when you want to enable only specific ciphers. For example, settingnsSSL3Ciphersto-all,+TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384configures Directory Server to disable all ciphers and enable onlyTLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384.
4.2. Weak ciphers Copiar enlaceEnlace copiado en el portapapeles!
By default, Directory Server rejects weak ciphers and you must configure Directory Server to support them.
Ciphers are considered weak, if:
They are exportable.
Exportable ciphers are labeled
EXPORTin the cipher name. For example, inTLS_RSA_EXPORT_WITH_RC4_40_MD5.They are symmetrical and weaker than the
3DESalgorithm.Symmetrical ciphers use the same cryptographic keys for both encryption and decryption.
- The key length is shorter than 128 bits.
4.3. Setting ciphers Directory Server supports using the command line Copiar enlaceEnlace copiado en el portapapeles!
To update the list of supported ciphers in Directory Server, update the nsSSL3Ciphers parameter.
Prerequisites
- You enabled TLS encryption in Directory Server.
Procedure
Display the list of enabled ciphers:
# dsconf -D "cn=Directory Manager" ldap://server.example.com security ciphers list --enabledIf you need to enable weak ciphers, enter:
# dsconf -D "cn=Directory Manager" ldap://server.example.com security set --allow-insecure-ciphers onUpdate the
nsSSL3Ciphersparameter. For example, to enable only theTLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384andTLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384ciphers, enter:# dsconf -D "cn=Directory Manager" ldap://server.example.com security ciphers set -- "-all,+TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,+TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384"Use
--to avoid that the shell interprets the-character in-allas an option to the command. Do not use a\character to escape-allbecause it can create an error and this results in a different cipher selection.Restart the instance:
# dsctl instance_name restart
Verification
Display the list of enabled ciphers:
# dsconf -D "cn=Directory Manager" ldap://server.example.com security ciphers list default +TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 +TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
4.4. Setting ciphers Directory Server supports using the web console Copiar enlaceEnlace copiado en el portapapeles!
You can configure the cipher settings in the Cipher Preferences menu of the Directory Server web console.
Prerequisites
- You enabled TLS encryption in Directory Server.
- You are logged in to the instance in the web console.
Procedure
If you need to enable weak ciphers:
-
Navigate to
. -
Select
Allow Weak Ciphers. -
Click
Save Settings.
-
Navigate to
-
Navigate to
. Update the cipher settings. For example, to enable only the
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384andTLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384ciphers:-
Select
No Ciphersin theCipher Suitefield. -
Enter
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384in theAllow Specific Ciphersfield.
-
Select
- Click .
-
Click
.
Verification
-
Navigate to
. The Enabled Cipherslist displays the ciphers that are enabled.