You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The following should be included in your Feature Request submission into Github. Be sure to set the GitHub label to "feature":
What?
To allow Graylog to use one or more of the following cipher suites with TLS 1.2:
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_GCM_SHA384
Graylog is unable to connect to their LDAP servers with only tlsv1.2 enabled because neither server is using the same cipher suites
list of TLS Cipher Suites the graylog client can attempt:
If we look at the nmap scan against the active directory server, we can see the list of TLS Cipher suits it will allow:
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_GCM_SHA384
Intended Purpose:
To allow customer to disable TLSv1.1, and still be able to connect to their Active directory servers.
Expected Outcome:
To allow customer to disable TLSv1.1, and still be able to connect to their Active directory servers.
Why?
Business Impact:
Customer currently unable to disable TLSv1.1, and believe that their team won't be able to enable any ciphers on their LDAP servers.
Your Environment
Graylog Version: 5.2.9
The text was updated successfully, but these errors were encountered:
The following should be included in your Feature Request submission into Github. Be sure to set the GitHub label to "feature":
What?
To allow Graylog to use one or more of the following cipher suites with TLS 1.2:
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_GCM_SHA384
Graylog is unable to connect to their LDAP servers with only tlsv1.2 enabled because neither server is using the same cipher suites
list of TLS Cipher Suites the graylog client can attempt:
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS_EMPTY_RENEGOTIATION_INFO_SCSV
If we look at the nmap scan against the active directory server, we can see the list of TLS Cipher suits it will allow:
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_GCM_SHA384
Intended Purpose:
To allow customer to disable TLSv1.1, and still be able to connect to their Active directory servers.
Expected Outcome:
To allow customer to disable TLSv1.1, and still be able to connect to their Active directory servers.
Why?
Business Impact:
Customer currently unable to disable TLSv1.1, and believe that their team won't be able to enable any ciphers on their LDAP servers.
Your Environment
Graylog Version: 5.2.9
The text was updated successfully, but these errors were encountered: