Posted on 07-02-2015 09:11 PM
Hi All,
I just updated to Firefox 39 and found that i could no longer connect to the JSS admin console. Firefox would throw the following error when trying to connect.
Secure Connection Failed
An error occurred during a connection to <JSS DNS>:8443. SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. (Error code: ssl_error_weak_server_ephemeral_dh_key)
The page you are trying to view cannot be shown because the authenticity of the received data could not be verified. Please contact the website owners to inform them of this problem.
I believe this is cause by the team over at Mozilla being strict about allowing connections to sites that use versions of TLS that a suceptible to the LogJam vulnerability. more info here https://weakdh.org/
As a workaround i have found modifying the server.xml file in
/usr/local/jss/tomcat/conf/sever.xml
Change the line chipher string
FROM:
ciphers="SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA"
TO:
ciphers="TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA,SSL_RSA_WITH_RC4_128_SHA"
I am still testing this out but it seems to solve the problem.
Regards,
Ash
Solved! Go to Solution.
Posted on 07-03-2015 12:29 AM
Separating this out to highlight it as a solution.
As a workaround i have found modifying the server.xml file in
/usr/local/jss/tomcat/conf/sever.xml
Change the line chipher string
FROM:
ciphers="SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA"
TO:
ciphers="TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA,SSL_RSA_WITH_RC4_128_SHA"
Posted on 07-03-2015 12:19 AM
Having the same issue here... -> ssl_error_weak_server_ephemeral_dh_key
I'm using Chrome for Casper, no issues there...
Posted on 07-03-2015 12:29 AM
Separating this out to highlight it as a solution.
As a workaround i have found modifying the server.xml file in
/usr/local/jss/tomcat/conf/sever.xml
Change the line chipher string
FROM:
ciphers="SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA"
TO:
ciphers="TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA,SSL_RSA_WITH_RC4_128_SHA"
Posted on 07-03-2015 01:43 AM
This fixed a separate issue for us where we couldn't view the JSS over 844.
Thanks!
Posted on 07-03-2015 06:08 AM
Thanks for cipher solution!
I just wanted to add my symptom for the next person because Chrome acted more vague...
Oddly enough Chrome (same build number) on Windows 7 was working just fine.
Posted on 07-05-2015 06:13 AM
I just got the same error this weekend when trying to log into the JSS with Firefox 39. I then tried Safari (8.0.7), and it was able to load the web page.
Posted on 07-06-2015 08:01 AM
Since RC4 is on it's way out...
Anyone try this cipher list without the 2 RC4 ciphers? I know it shouldn't impact accessing the JSS from a modern browser, but what about client communication?
Posted on 07-06-2015 10:01 AM
Thanks for the prompt solution. I was just starting to investigate this today. Saved me a few hours for sure.
You guys are great.
Posted on 07-06-2015 10:05 AM
This is because of the Logjam attack on the Diffie-Hellman key exchange. You can read more at https://weakdh.org
Posted on 07-08-2015 12:36 PM
I downgraded to FF 38.0.1. It works, so that's an option.
Posted on 07-08-2015 01:50 PM
Well, that was an easy fix to a scary problem.
Posted on 07-08-2015 09:06 PM
Since RC4 is on it's way out... Anyone try this cipher list without the 2 RC4 ciphers? I know it shouldn't impact accessing the JSS from a modern browser, but what about client communication?
@cbrewer I would like to know that as well. I'm going to remove RC4 ciphers on our test server, check client communication and report findings here!
Posted on 07-09-2015 05:05 AM
I haven't tested this on Firefox for Mac, but found a way to get through it on Firefox on Windows.
Edit: I tested this, this morning and was able to get to the JSS. I'm not sure if it took a minute to make the change, but I had to close out Firefox and relaunch it and all was well.
Go to about:config and search for security.ssl3.
Change the security.ssl3.dhe_rsa_aes_128_sha to false.
Change the security.ssl3.dhe_rsa_aes_256_sha to false.
This allows me to get it after accepting the certificate.
Posted on 07-09-2015 07:49 AM
Thank you so much for the fast solution! I started up Firefox this morning and got the updating Firefox window and thought nothing of it. I never expected that a simple browser update would kill my access to the JSS.
Posted on 07-09-2015 08:19 AM
This solved my issue I ran into this morning and was able to fix this quickly. Thank You!
Posted on 07-09-2015 08:25 AM
We ran into an issue using Safari on Mac OS X 10.11 and this solved the issue. Thanks!
Posted on 07-09-2015 09:08 AM
I can confirm that this fixed our issue as well. The only slight problem we had when implementing the fix was we forgot to append the keystore back into the text after pasting it into the xml file. After copying back in from a backup of the original we were just fine.
Posted on 07-09-2015 11:49 AM
@jpilege I like your suggestion better. I'd rather make a change on my browser than the server. I found that just setting security.ssl3.dhe_rsa_aes_128_sha to false worked for me.
Posted on 07-10-2015 03:35 AM
I had to change the cipher list too to make Firefox working again.... I thought I could change the Protocols too....
But the SelfService still needs TLS1.0 :-(((((
This may be the proper settings for current installs:
sslProtocol="TLS" sslEnabledProtocols="TLSv1.2, TLSv1.1, TLSv1" ciphers="TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 , TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA"
Posted on 07-10-2015 04:57 AM
If you generally want to test the cryptographic strength of your server communications, Qualys has a great test suite.
https://www.ssllabs.com/ssltest/
Secure your shit.
I have a blog post here for the noobs: https://nerdily.org/hillary-clinton
Posted on 07-10-2015 10:22 AM
You can use the Disable DHE add-on (https://addons.mozilla.org/en-US/firefox/addon/disable-dhe/) as well to get Firefox 39 to work with the JSS admin console again.
Posted on 07-16-2015 09:43 AM
This post elaborates a little on the change suggested by @Stonham:
How to Disable Weak Ciphers and SSL 2.0 in Tomcat
Comodo has an article too, which does not reference Java/JDK 6 (which is still on our server(s).
HOW TO -- Disable weak ciphers in Tomcat 7 & 8
If I elect to update the JDK to a newer version on our JSS, I am assuming I need to generate a new keystore—is that correct? Any other potential impact?
Posted on 07-19-2015 07:02 AM
I highly recommend removing SSL_RSA_WITH_RC4_128_SHA as it's a weak cipher and any type of SSL/TLS scan will ding you on this.
Posted on 07-23-2015 01:09 PM
@Stonham Do you have 9.72 installed for this?
Are people seeing this with 9.72 installed?
Posted on 07-23-2015 01:26 PM
I believe the JAMF recommended solution is here Configuring Supported Ciphers for Tomcat HTTPS Connections
Posted on 07-23-2015 01:26 PM
This doesn't really have anything to do with 9.72 versus 9.73, unless you've installed 9.73 from scratch.
It has everything to do with ciphers.
Posted on 08-03-2015 07:20 AM
Thanks, this fixed it for me as well.
Posted on 08-04-2015 01:55 PM
I followed the cipher directions here Configuring Supported Ciphers for Tomcat HTTPS Connections and now systems with 10.5 and older are not able to connect to the JSS and Casper Remote can't be used with them. I suspect this is a limitation in that older versions of Mac OS X don't support the stronger ciphers.
Have others observed this with 10.5 and older devices?
Posted on 09-17-2015 10:21 PM
Thank you so much all, Stonham's solution worked for us too!