I'm curious how other CentOS- or RHEL-hosted JSS admins are handling this.
I recently found that the JAMF article Configuring Supported Ciphers for Tomcat HTTPS Connections is only partially effective in my environment. We run a CentOS cluster that was set up using the manual installation/config guide. As recommended in release notes, we use OpenJDK and Tomcat 7.
The core problem I find with limiting tomcat to the recommended ciphers is that OpenJDK doesn't have them. I see two approaches to working around this, adding BouncyCastle as an OpenJDK provider, or using some other JDK (Oracle?).
I've got the BouncyCastle option working in my environment. but not how I would have expected. Because JAMF bundles a version of the bc provider in the jss web app, installing the latests bc provider in $JAVA_HOME/lib/ext/ causes some strange behavior. Instead, I symlinked to from $JAVA_HOME/lib/ext/bcprov.jar to .../tomcat/webapps/root/WEB-INF/lib/bcprov.jar, then referenced the provider in java.security as normal. This seems to be working well in that the web app initializes normally, and can access the recommended cipher set.
Aside from the obvious maintenance concerns this raises around updates(etc), how bad an idea do you find the BouncyCastle symlink workaround? What alternatives do you prefer?