How to verify TLS v.1.2 is configured correctly in RSA Authentication Manager 8.x
a year ago
Originally Published: 2016-04-01
Article Number
000058738
Applies To

RSA Product Set: SecurID
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.x

Issue

Secure Sockets Layer (SSL) connections use a protocol such as SSL version 3 or TLS version 1, and they use a cipher, such as RC4.

RSA Authentication Manager products generally;

  •  No longer use the older SSL2.
  • Still allow SSL3, unless disabled with RSA Authentication Manager SP1 patch 13, the TLS patch.
  • Prefer or default to using TLS version 1 (aka TLS1) starting with RSA Authentication Manager 8.1 SP1 patch 2.

One immediate problem with RSA Authentication Manager 8.1 SP1 patch 13 is that while the Oracle WebLogic server embedded in RSA Authentication Manager supports TLS1.2, the openssl utility included in the SUSE Linux distribution does not. If you use openssl to test that the RSA Authentication Manager server works (and prevents other protocols such as SSL version 3 or TLS version 1), you have to test from another platform, not from the RSA Authentication Manager server itself.

This article shows how to verify that the TLS 1.2 configuration is working correctly, and shows some useful testing and troubleshooting techniques using the openssl utility.

Resolution
The openssl version will display the version of your openssl distribution.
  • Many later versions of Red Hat or Ubuntu include a later version of openssl, such as 1.0.1:
[root@rh81wt !]# openssl version
OpenSSL 1.0.1e-fips 11 Feb 2013


You can force openssl s_client to request a specific protocol such as TLS version 1.2 with the -tls1_2 switch. In this example, 192.168.2.30 is an RSA Authentication Manager 8.1 SP1 patch 13 appliance and :7004 is the port for the Security Console and Self-Service Console:

rsaadminam81p~>openssl s_client -connect 192.168.2.30:7004 -tls1_2
unknown option -tls1_2
usage: s_client args
-host host - use -connect instead
-port port - use -connect instead


You will see a syntax error with openssl version 0.98 because TLS1.2 is not supported, so the -tls1_2 switch is an unknown option. The same command with openssl version 1.0.1 or later works, the option is known and recognized.
 

[root@rh81wt !]# openssl s_client -connect 192.168.2.30:7004 -tls1_2
CONNECTED (00000003)
depth=1 CN = RSA root CA for am81p.vcloud.local, serialNumber-2660b7301e756f1418b6cb8fb3145ff0b32d296f0f21f901cfe65ae486701349
Verify error:num-19:self signed certificate in certificate chain
verify return:0
140401050306376:error:100AE081:elliptic curve routine:EC_GROUP_new by_curve_name:unknown group:ec_curve.c:316:
140401050306376:error:1408D010:SSL routines:SSL3_GET_KEY_EXCHNGE:EC lib:s3_clnt.c:1641:
---
certificate chain

Scroll down to see:

server public key is 2048 bit
Secure Renegotiation is supported
Compression: NONE
Expansion:   NONE
SSL-Session:
    Protocol  : TLSv1.2
Notes

Enabling TLS1.2 mode on RSA Authentication Manager 8.1 SP1 patch 13 and later servers requires that RSA Authentication Agents for Windows that require auto-registration and offline data also be upgraded to RSA Authentication Agents for Windows 7.3 or later.

Some openssl syntax examples:

openssl version
1.0.1 supports up to TLS ver. 1.2, 
openssl s_client -connect 192.168.2.30:7004
openssl s_client -connect 192.168.2.30:7004 -ssl3
openssl s_client -connect 192.168.2.30:7004 -tls1
openssl s_client -connect 192.168.2.30:7004 -tls1_1
openssl s_client -connect 192.168.2.30:7004 -tls1_2
openssl s_client -connect 192.168.2.30:7004 -showcerts


See 000032627 - How to export RSA Authentication Manager 8.x Web Tier Virtual Host Key Pair to a PFX file.