Penetration tests against NAM 3.2 failing because of ActiveMQ weak ciphers
This document (7011929) is provided subject to the disclaimer at the end of this document.
NetIQ Access Manager 3.2 Support Pack 1 applied
Peneration tests performed against all NAM components
Access Gateway Appliance failing penetration test
One test continued to fail against TCP port 61617 - the SSL port used by ActiveMQ. there appeared to be no configuration files where the ciphers could be manually changed.
<transportConnector name="ssl" uri="ssl://127.0.0.1:61617"/>
This will block any access to the ActiveMQ SSL service from deices other than localhost.
Another option would be to use iptables to block access to this TCP port from any host other than localhost.
This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.
- Document ID:7011929
- Creation Date:13-MAR-13
- Modified Date:13-MAR-13
- NetIQAccess Manager (NAM)
Did this document solve your problem? Provide Feedback