Secure Connection Between Identity Router and Identity Source (AD/LDAP) Fails When DHE Cipher Suites are Used
8 months ago
Article Number
000073501
Applies To

RSA Product Set: RSA ID Plus

RSA Product/Service Type: Cloud Access Service (CAS), Identity Router (IDR)

 

Issue

The IDR operates in strict FIPS 140 mode, requiring all communications to use FIPS 140-compliant cipher suites. For DHE cipher suites—such as TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, and TLS_DHE_RSA_WITH_AES_256_GCM_SHA384—a minimum 2048-bit DH key size is mandatory. However, Active Directory (AD)/LDAP servers typically use a 1024-bit DH key size by default, which prevents the IDR from establishing a connection when these ciphers are in use.

  

When the Diffie-Hellman (DH) key size is increased to 2048 bits on the AD/LDAP server by following Microsoft Security Advisory 3174644, you may still encounter connection issues. If the issue persists after increasing the key size, check the IDR logs for the following error:

"DH Parameters without subprime Q are not FIPS 140 approved, specify using DSAParameterSpec or 42DHParameterSpec"

This error indicates that the 'q' parameter is missing in the DH parameters used by the DHE cipher suites. While the 'q' parameter is optional by standard, it is required for FIPS 140-2 compliance. The absence of this parameter leads to the preceding error.

Resolution

The IDR supports a wide range of non-DHE cipher suites that are FIPS 140 compliant. On the AD/LDAP server, you can configure the preferred order of cipher suites. By prioritizing FIPS 140 compliant, non-DHE cipher suites above the DHE options in the list, the issue can be resolved.

To re-order the cipher suites:

  1. On the Active Directory Server, go to Start > Administrator Tools > Group Policy Management.
  2. In the left pane, navigate to Forest >Domains > Domain Name and expand it.
  3. Right-click Default Domain Policy.
  4. Click Edit in the context menu. It shows the Group Policy Management Editor.
  5. Go to Computer Configuration > Policies > Administrative Templates > Network > SSL Configuration Settings.
  6. Double-click SSL Cipher Suite Order.
  7. On the SSL Cipher Suite Order window, click Enabled if not already enabled.
  8. If enabled, add the below-mentioned list of cipher suites on top of the already existing cipher suites.
  9. If not enabled, click Enable.
    All the cipher suites will be listed in the Options pane.
  10. Reorder the cipher suites in such a way that the Non-DHE FIPS 140 compliant ciphers are on top and the DHE ciphers are at the bottom. (Following is the list of some non-DHE FIPS 140 compliant cipher suites which can be used.)
  11. Apply the changes.
  12. Restart the server.
  13. Test the Identity Source connection from the Admin Console.

    

List of Strong Ciphers

  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
  • TLS_RSA_WITH_AES_256_GCM_SHA384
  • TLS_RSA_WITH_AES_128_GCM_SHA256
  • TLS_RSA_WITH_AES_256_CBC_SHA256 

Note: These are some of the strong ciphers. There can be other strong ciphers also that can be used.