RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.4.0
Symptoms include;
- A network packet capture shows the Authentication Manager server sending an SSL/TLS client hello request to the domain controller requesting a connection on TLSv1.2 using any of 31 ciphers listed. The DC responds that it will use the TLS_DHE_RSA_WITH_AES_256_GCM_SHA_384 Cipher Suite, which was one of the ciphers in the Authentication Manager.
- The verbose /opt/rsa/am/server/logs/imsTrace.log shows the Diffie-Hellman DH Key negotiation fails
Caused by: java.security.InvalidAlgorithmParameterException: Accepted DH prime length is 2048 or higher
Authentication Manager 8.4 is FIPS compliance for cryptographic operations (see the RSA Announces the Release of RSA Authentication Manager 8.4), which means that 1024-bit certificates are no longer supported. However, in these customer cases the domain controller and the Authentication Manager 8.4 server both have 2048-bit certificates.
However, within the negotiation of an SSL/TLS connection, the cipher suites that use Diffie-Hellman for key exchange must use a 2048-bit prime when generating a key pair.
In this case, the responding SSL server (which was an F5 load balancer in front of the domain controller) responded that the TLS_DHE_RSA_WITH_AES_256_GCM_SHA_384 cipher suite would be using a 1024 prime to generate a DHE key pair.
Because the F5 is using a DHE key size that is not FIPS 140-2 compliant, the Authentication Manager server errors out and the LDAPS connection fails.
This hotfix is planned for release in Authentication Manager 8.4 patch 2, or customer support has a hotfix that could be applied to Authentication Manager 8.4 base.
Global variable fix to avoid cipher suites that allow negotiation of non-FIPS 140-2 compliant cipher components
- Open an SSH session on each Authentication Manager server, starting with the primary first.
- Login as the rsaadmin user, noting that during Quick Setup another user name may have been selected. If that is the case, that user name to login.
- Navigate to /opt/rsa/am/utils.
- Run the command ./rsautil store -a add_config ims.tls.cipher_list.use_via_trust true GLOBAL BOOLEAN. This global variable prevents Authentication Manager 8.4 from including the TLS_DHE_RSA_WITH_AES_256_GCM_SHA_384 cipher suite in the SSL client hello to the domain controller (F5) when trying to connect using LDAPS. Internal testing at RSA has been done by Support and QE.
Using keyboard-interactive authentication.
Password: <enter operating system password>
Last login: Tue FEb 26 10:36:31 2018 from 192.168.2.102
RSA Authentication Manager Installation Directory: /opt/rsa/am
rsaadmin@am82p:~> cd /opt/rsa/am/utils r
saadmin@am82p:/opt/rsa/am/utils> ./rsautil store -a add_config ims.tls.cipher_list.use_via_trust true GLOBAL BOOLEAN Please enter OC Administrator user name: <enter Operations Console administrator name>
Please enter OC Administrator password: <enter Operations Console administrator password>
psql.bin:/tmp/f8e39a3c-a614-41e3-be96-299e670f0a73525273943558510875.sql;0108; NOTICE: Added the new configuration parameter "ims.tls.cipher_list.use_via_trust" with the value "true"
add_config
---------------------
(1 row)
rsaadmin@am82p:/opt/rsa/am/utils>
- Use add_config the first time you run this command because you are creating or adding a new global variable for the code to use.
- Use update_config any subsequent to undo this change. For example,
Please enter OC Administrator user name: <enter Operations Console administrator name>
Please enter OC Administrator password: <enter Operations Console administrator password>
psql.bin:/tmp/e6871864-6126-47cc-af20-0c261a3bbb643013521437038491182.sql;167; NOTICE: Added the new configuration parameter "ims.tls.cipher_list.use_via_trust" from "true" to "false" for the instance 'GLOBAL'.
update_config
---------------------
(1 row)
rsaadmin@am82p:/opt/rsa/am/utils>
See related issue AM-33242 (After Authentication Manager 8.4 upgrade SMS HTTPS plugin fails with some cipher suite)/
Also, there is no way to avoid the stricter protocol and cipher suites associated with FIPS 140-2 compliance on the Authentication Manager 8.4 servers. You cannot turn it off and use these types of cipher suites
Related Articles
Authentication Manager 8.8 update breaks TLS connections; TLS Handshake error no cipher suites in common 72Number of Views PAM Agent is failing to connect to RSA Servers (Curl error code: 35) 37Number of Views Failing to access Identity Router IDR Web resource after IDR v2.17 update 114Number of Views Monitor Uptime Status for Cloud Access Service 134Number of Views Troubleshooting Cloud Access Service User Issues 138Number of Views
Trending Articles
RSA Authentication Manager Upgrade Process RSA Release Notes for RSA Authentication Manager 8.8 RSA RADIUS Server service failed to start in the RSA Authentication Manager 8.1 Operations Console Microsoft Entra ID External MFA - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide RSA Release Notes: Cloud Access Service and RSA Authenticators