The Logjam attack allows a man-in-the-middle attacker to downgrade vulnerable TLS connections to 512-bit export-grade cryptography. This allows the attacker to read and modify any data passed over the connection. The attack is reminiscent of the FREAK attack, but is due to a flaw in the TLS protocol rather than an implementation vulnerability, and attacks a Diffie-Hellman key exchange rather than an RSA key exchange. The attack affects any server that supports DHE_EXPORT ciphers, and affects all modern web browsers. 8.4% of the Top 1 Million domains were initially vulnerable. For more details on this, refer the following link:
Perform the following steps to secure Adeptia Suite from the Logjam attack:
- Copy the complete XML excerpt from the attached file ExcludeCipher.xml.
- Go to the Current Adeptia Suite installation location inside ServerKernel/etc/jetty.
- Open the jetty.xml file and paste the XML content copied from Step1 inside the following element in the jetty.xml file:
<New id="sslContextFactory" class="org.eclipse.jetty.http.ssl.SslContextFactory">
4. Save the jetty.xml file.
5. Restart Adeptia Services.
PS: If you are using multiple context factory then above steps have to be performed in every SslContextFactory.
Article is closed for comments.