Configuring Cipher Suites
A cipher suite is really four different ciphers in one, describing the key exchange, bulk encryption, message authentication and random number function. There is no official naming convention of cipher suites, but most cipher suites are described in order – for example, “TLS_DHE_RSA_WITH_AES_256_CBC_SHA” uses DHE for key exchange, RSA for server certificate authentication, 256-bit key AES in CBC mode for the stream cipher, and SHA for the message authentication.
Configuring Enabled Ciphers
The list of cipher suites is ordered by the SunJSSE provider cipher suites.
The list of cipher suites can be configured manually using the ssl-config.enabledCipherSuites
setting:
ssl-config.enabledCipherSuites = [
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256"
]
This can be useful to enable perfect forward security, for example, as only DHE and ECDHE cipher suites enable PFE.
Recommendation: increase the DHE key size
Diffie Hellman has been in the news recently because it offers perfect forward secrecy. If you have JDK 1.8, setting the system property -Djdk.tls.ephemeralDHKeySize=2048
is recommended to ensure stronger keysize in the handshake. Please see Customizing Size of Ephemeral Diffie-Hellman Keys.
Recommendation: Use Ciphers with Perfect Forward Secrecy
As per the Recommendations for Secure Use of TLS and DTLS, the following cipher suites are recommended:
ssl-config.enabledCipherSuites = [
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
]
Some of these ciphers are only available in JDK 1.8.
Disabling Weak Ciphers and Weak Key Sizes Globally
The jdk.tls.disabledAlgorithms
can be used to prevent weak ciphers, and can also be used to prevent small key sizes from being used in a handshake. This is a useful feature that is only available in Oracle JDK 1.7 and later.
The official documentation for disabled algorithms is in the JSSE Reference Guide.
For TLS, the code will match the first part of the cipher suite after the protocol, i.e. TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 has ECDHE as the relevant cipher. The parameter names to use for the disabled algorithms are not obvious, but are listed in the Providers documentation and can be seen in the source code.
To enable jdk.tls.disabledAlgorithms
or jdk.certpath.disabledAlgorithms
(which looks at signature algorithms and weak keys in X.509 certificates) you must create a properties file:
# disabledAlgorithms.properties
jdk.tls.disabledAlgorithms=EC keySize < 160, RSA keySize < 2048, DSA keySize < 2048
jdk.certpath.disabledAlgorithms=MD2, MD4, MD5, EC keySize < 160, RSA keySize < 2048, DSA keySize < 2048
And then start up the JVM with java.security.properties:
java -Djava.security.properties=disabledAlgorithms.properties