Novell Home

My Favorites

Close

Please to see your favorites.

Penetration tests against NAM 3.2 failing because of ActiveMQ weak ciphers

This document (7011929) is provided subject to the disclaimer at the end of this document.

Environment

NetIQ Access Manager 3.2
NetIQ Access Manager 3.2 Support Pack 1 applied
Peneration tests performed against all NAM components
Access Gateway Appliance failing penetration test

Situation

Access Manager 3.2 setup and working fine. Prior to rolling out in production, a penetration test for PCI compliance was performed against all components. A number of components tested came back reporting support for weak ciphers. By following the best practice guidelines in the documentation, the Identity Server, Embedded Service provider support cipher list under server.xml were changed to only include strong ciphers; the Apache proxy configuration was also modified to include striong cipher support using the SSProxyCipherSuite Advanced Option.

One test continued to fail against TCP port 61617 - the SSL port used by ActiveMQ. there appeared to be no configuration files where the ciphers could be manually changed.

Resolution

Modify the /etc/opt/novell/activemq/activemq.xml file and change the localhost entry to specifically state 61617 as shown below:

            <transportConnector name="ssl" uri="ssl://127.0.0.1:61617"/>

This will block any access to the ActiveMQ SSL service from deices other than localhost.

Another option would be to use iptables to block access to this TCP port from any host other than localhost.

Disclaimer

This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:7011929
  • Creation Date:13-MAR-13
  • Modified Date:13-MAR-13
    • NetIQAccess Manager (NAM)

Did this document solve your problem? Provide Feedback