Skip to content

Commit 82bcc74

Browse files
committed
Merge branch '4.11'
2 parents 68251e8 + da8cf8c commit 82bcc74

5 files changed

Lines changed: 8 additions & 8 deletions

File tree

plugins/event-bus/rabbitmq/src/main/java/org/apache/cloudstack/mom/rabbitmq/RabbitMQEventBus.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ public class RabbitMQEventBus extends ManagerBase implements EventBus {
6161
private static Integer port;
6262
private static String username;
6363
private static String password;
64-
private static String secureProtocol = "TLSv1";
64+
private static String secureProtocol = "TLSv1.2";
6565

6666
public synchronized static void setVirtualHost(String virtualHost) {
6767
RabbitMQEventBus.virtualHost = virtualHost;
@@ -623,4 +623,4 @@ public void handleDelivery(String queueName, Envelope envelope, AMQP.BasicProper
623623
return;
624624
}
625625
}
626-
}
626+
}

systemvm/debian/etc/apache2/vhost.template

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@
8989
# SSL Engine Switch:
9090
# Enable/Disable SSL for this virtual host.
9191
SSLEngine on
92-
SSLProtocol all -SSLv2 -SSLv3
92+
SSLProtocol TLSv1.2
9393
SSLCipherSuite ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA
9494
SSLHonorCipherOrder on
9595

tools/appliance/systemvmtemplate/scripts/configure_systemvm_services.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ function configure_apache2() {
2828
# Backup stock apache configuration since we may modify it in Secondary Storage VM
2929
cp /etc/apache2/sites-available/000-default.conf /etc/apache2/sites-available/default.orig
3030
cp /etc/apache2/sites-available/default-ssl.conf /etc/apache2/sites-available/default-ssl.orig
31-
sed -i 's/SSLProtocol all -SSLv2$/SSLProtocol all -SSLv2 -SSLv3/g' /etc/apache2/mods-available/ssl.conf
31+
sed -i 's/SSLProtocol .*$/SSLProtocol TLSv1.2/g' /etc/apache2/mods-available/ssl.conf
3232
}
3333

3434
function install_cloud_scripts() {

utils/src/main/java/org/apache/cloudstack/utils/security/SSLUtils.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ public class SSLUtils {
3434
public static String[] getSupportedProtocols(String[] protocols) {
3535
Set<String> set = new HashSet<String>();
3636
for (String s : protocols) {
37-
if (s.equals("SSLv3") || s.equals("SSLv2Hello")) {
37+
if (s.equals("TLSv1") || s.equals("TLSv1.1") || s.equals("SSLv3") || s.equals("SSLv2Hello")) {
3838
continue;
3939
}
4040
set.add(s);
@@ -46,7 +46,7 @@ public static String[] getSupportedProtocols(String[] protocols) {
4646
* It returns recommended protocols that are considered secure.
4747
*/
4848
public static String[] getRecommendedProtocols() {
49-
return new String[] { "TLSv1", "TLSv1.1", "TLSv1.2" };
49+
return new String[] { "TLSv1.2" };
5050
}
5151

5252
/**

utils/src/test/java/com/cloud/utils/security/SSLUtilsTest.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,9 +69,9 @@ public void getSupportedProtocolsTest() {
6969
}
7070

7171
private void verifyProtocols(ArrayList<String> protocolsList) {
72-
Assert.assertTrue(protocolsList.contains("TLSv1"));
73-
Assert.assertTrue(protocolsList.contains("TLSv1.1"));
7472
Assert.assertTrue(protocolsList.contains("TLSv1.2"));
73+
Assert.assertFalse(protocolsList.contains("TLSv1"));
74+
Assert.assertFalse(protocolsList.contains("TLSv1.1"));
7575
Assert.assertFalse(protocolsList.contains("SSLv3"));
7676
Assert.assertFalse(protocolsList.contains("SSLv2Hello"));
7777
}

0 commit comments

Comments
 (0)