Configuring Transport Level Security¶
Given below are the various transport-level security configurations that are required for MWARE ESB. See the following topics for instructions.
Disabling weak ciphers¶
A cipher is an algorithm for performing encryption or decryption. When you set the sslprotocol
of your server to TLS, the TLS and the default ciphers get enabled without considering the strength of the ciphers. This is a security risk as weak ciphers, also known as EXPORT ciphers, can make your system vulnerable to attacks such as the Logjam attack on Diffie-Hellman key exchange. The Logjam attack is also called the Man-in-the-Middle attack. It downgrades your connection's encryption to a less-secured level (e.g., 512 bit) that can be decrypted with sufficient processing power.
To prevent these types of security attacks, it is encouraged to disable the weak ciphers. You can enable only the ciphers that you want the server to support in a comma-separated list in the ciphers
attribute. Also, if you do not add this cipher attribute or keep it blank, the browser will support all the SSL ciphers by JSSE. This will enable the weak ciphers.
Disabling weak ciphers for the Tomcat transport¶
- Open the
<PRODUCT_HOME>/repository/conf/deployment.toml
file. - Take a backup of the
deployment.toml
file and stop the Carbon server. -
Add the following configuration to the
deployment.toml
file by adding the list of ciphers that you want your server to support as follows:ciphers=","
.
See the list of supported cipher suites .[transport.https.sslHostConfig.properties] ciphers="TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSVF"
-
Start the server.
-
To verify that the configurations are all set correctly, download and run the testsslserver.jar.
Note
Note the following when you run
testsslserver.jar
:-
The "Supported cipher suites" section in the output does not contain any EXPORT ciphers.
-
When you use the supported cipher suites listed here, the BEAST attack status will be shown as vulnerable. Note that this is a client-side vulnerability caused by the TLSv1 protocol. You can make the BEAST status protected by removing TLSv1, which will make clients with TLSv1 unusable. Therefore, it is recommended tofixed this from the client side.
$ java -jar testsslserver.jar localhost 9443
-
Info
From Firefox 39.0 onwards, the browser does not allow to access Web sites that support DHE with keys less than 1023 bits (not just DHE_EXPORT). 768/1024 bits are considered to be too small and vulnerable to attacks if the hacker has enough computing resources.
Tip
- To use AES-256, the Java JCE Unlimited Strength Jurisdiction Policy files need to be installed. Download them from http://www.oracle.com/technetwork/java/javase/downloads/index.html, if your Java installation does not have it installed.
- From Java 7, you must set the
jdk.certpath.disabledAlgorithms
property in the<JAVA_HOME>/jre/lib/security/java.security
file tojdk.certpath.disabledAlgorithms=MD2, DSA, RSA keySize < 2048
. It rejects all algorithms that have key sizes less than 2048 for MD2, DSA and RSA.
Configuring PassThrough transport-level ciphers and TLS versions¶
-
To enable preferred ciphers, add the configuration given below to the
<PRODUCT_HOME>/repository/conf/deployment.toml
file.[transport.passthru_https.listener.parameters] PreferredCiphers = "<CIPHER_LIST>"
[transport.passthru_https.listener.parameters] PreferredCiphers = "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384"
-
To enable HTTP protocols (TLS versions), add the configurations given below to the
<PRODUCT_HOME>/repository/conf/deployment.toml
file.[transport.passthru_https.listener.parameters] HttpsProtocols = "<TLS_VERSION_LIST>"
[transport.passthru_https.listener.parameters] HttpsProtocols = "TLSv1.2,TLSv1.3"
Changing the server name in HTTP response headers¶
By default, all MWARE products pass "MWARE Carbon Server" as the server value in HTTP headers when sending HTTP responses. This means that information about the MWARE product stack will be exposed through HTTP responses. It is recommended to change this by configuring the server name in the deployment.toml
file.
- Open the
<PRODUCT_HOME>/repository/conf/deployment.toml
file. -
Add a new server name using the
server
property (under the relevant Tomcat connector configuration):[transport.https.properties] server="MWARE Carbon Server" [transport.http.properties] server="MWARE Carbon Server"
Disabling HTTP Transports¶
Note
It is recommended to disable the HTTP transport in an ESB production setup. Using the Bearer
token over HTTP is a violation of the OAuth specification and can lead to security vulnerabilities.
ESB has two HTTP transports.
- Passthru (API Traffic) Transport
- Servlet (UI Traffic and Admin service access) Transport
See the instructions given below to disable these transports.
Disabling PassThrough Transport¶
Add the following configuration in the deployment.toml
file (stored in the <API-M_HOME>/repository/conf
folder).
[transport.passthru_http.listener]
enable = false
Note
Comment out or remove the http_endpoint
entry in the deployment.toml
file (stored in the <API-M_HOME>/repository/conf
folder). This is done to avoid an error that occurs when adding the above configuration.
[[apim.gateway.environment]]
name = "Default"
type = "hybrid"
display_in_api_console = true
description = "This is a hybrid gateway that handles both production and sandbox token traffic."
show_as_token_endpoint_url = true
service_url = "https://localhost:${mgt.transport.https.port}/services/"
username= "${admin.username}"
password= "${admin.password}"
ws_endpoint = "ws://gw.am.wso2.com:9099"
wss_endpoint = "wss://gw.am.wso2.com:8099"
http_endpoint = "http://gw.am.wso2.com:${http.nio.port}"
https_endpoint = "https://gw.am.wso2.com:${https.nio.port}"
Disabling Servlet Transport¶
Add the following configuration in the deployment.toml
file (stored in the <API-M_HOME>/repository/conf
folder).
[transport.http]
enable = false
Disabling the WebSocket Transport¶
Add the following configuration in the deployment.toml
file (stored in the <API-M_HOME>/repository/conf
folder).
[apim.ws]
enable = false
Disabling the WebHook Transport¶
Add the following configuration in the deployment.toml
file (stored in the <API-M_HOME>/repository/conf
folder).
[apim.webhooks.http]
enable = false
What's Next?¶
See the Security Guidelines for Production Deployment for the full list of security-related recommendations for MWARE ESB.
Top