[OPENAM-14986] AM Cannot connect to TLSv1.2 DJ server (production mode) after JDK 8 update 192 Created: 28/May/19 Updated: 20/Apr/20 Resolved: 18/Oct/19 |
|
Status: | Resolved |
Project: | OpenAM |
Component/s: | idrepo |
Affects Version/s: | 5.5.1, 6.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, 6.0.0.4, 6.0.0.5, 6.0.0.6 |
Fix Version/s: | 13.5.3, 14.1.2, 6.0.1, 5.5.2 |
Type: | Bug | Priority: | Major |
Reporter: | C-Weng C | Assignee: | Kamal Sivanandam |
Resolution: | Fixed | Votes: | 0 |
Labels: | EDISON | ||
Remaining Estimate: | Not Specified | ||
Time Spent: | Not Specified | ||
Original Estimate: | Not Specified |
Issue Links: |
|
||||||||||||||||||||||||||||
Target Version/s: | |||||||||||||||||||||||||||||
Rank: | 1|hzxs4v: | ||||||||||||||||||||||||||||
Sprint: | AM Sustaining Sprint 64, AM Sustaining Sprint 65 | ||||||||||||||||||||||||||||
Story Points: | 3 | ||||||||||||||||||||||||||||
Support Ticket IDs: | |||||||||||||||||||||||||||||
Verified Version/s: | |||||||||||||||||||||||||||||
Needs QA verification: |
No
|
||||||||||||||||||||||||||||
Functional tests: |
No
|
||||||||||||||||||||||||||||
Are the reproduction steps defined?: |
Yes and I used the same an in the description
|
Description |
Bug descriptionAM6.0.0.x is unable to connect to a DS6 production mode directory using latest JDK8 (> u192) How to reproduce the issue
Expected behaviourIdentities can be seen Current behaviourNo identities seen This issue is not seen on AM6.5.0 and AM 6.5.1 Work aroundAdd more ciphers to the DJ server (ie: mostly non TLSv1.2 ciphers)
It seems TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA seems to work (to add to the LDAPS ciphers needed)
The same system work before JDK8u192 and so a rollback to use earlier JDK version is also possible also Code analysisWhen in production mode the set of DJ server cipher suites are supportedTLSCiphers: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 supportedTLSCiphers: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 supportedTLSCiphers: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 supportedTLSCiphers: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 but from trace the LDAP client does not have these set of ciphers. This is causes by |
Comments |
Comment by Ľubomír Mlích [ 06/Sep/19 ] |
Reproduced in ForgeRock Access Management 5.5.1 Build 96b47ad4f1 (2017-October-26 15:41) I used different reproduction steps:
Installation failed with "invalid suffix"in both cases, I was able to use workaround, installation worked after adding TLS 1.1 and cipher above. Now it works without workaround. |