Article Number: 000129504
Dell Data Protection | Enterprise Server version 8.5.1 is set to communicate using TLS, to protect communications against the OpenSSL CVE-2014-3566 vulnerability, also known as Padding Oracle On Downgrade Legacy Encryption (POODLE). However, Dell Data Protection Self-Encryption Drive and Dell Data Protection | Hardware Crypto-Accelerator version 8.5 and earlier clients communicate with the Dell Data Protection | Enterprise Server using SSL. This means that when running Enterprise Server version 8.5.1, Dell Data Protection | Self-Encrypting Drive or Dell Data Protection | Hardware Crypto-Accelerator version 8.5 and earlier clients with Pre-boot Authentication (PBA) activated fails to communicate with Enterprise Server.
Enterprise Server can be set to accept SSL communication, in environments where issues resulting from Enterprise Server version 8.5.1/PBA client noncommunication outweigh risks and potential vulnerabilities that are associated with SSL.
This workaround must be implemented within the endpoints' Device Lease Period. If communication to Enterprise Server version 8.5.1 is unavailable, the following functionality is unavailable:
With v8.16 and later, PBA clients can communicate with the Enterprise Server using the TLS 1.2 protocol, rather an SSL, TLS 1, and TLS 1.1.
<Security Server install path>\conf\ spring-jetty.xml
.<!— <property name="excludeProtocols" value="SSL,SSLv2,SSLv3" /> -->
excludeProtocols
property rather than removing it, so that down-negotiation can later be disabled. To later disable down-negotiation, remove from the excludeProtocols
property.
On the Front End Server, <Security Server Proxy install path>\conf\ spring-jetty.xml
, comment out the excludeProtocols
property:
<!— <property name="excludeProtocols" value="SSL,SSLv2,SSLv3" /> -->
excludeProtocols
property rather than removing it, so that down-negotiation can later be disabled. To later disable down-negotiation, remove from the excludeProtocols
property.
ddpuser
ddpuser
delluser
delluser
su <username>
ddpsupport
ddpsupport
dellsupport
dellsupport
spring-jetty.xml
by running the following command:Sudo vi /opt/dell/server/security/conf/spring-jetty.xml
I
to enter INSERT mode then locate and comment out the following line:<property name="excludeProtocols" value="SSL,SSLv2,SSLv3" />
Figure 1: (English Only) Sping-jetty.xml
ESC
followed by :
then wq
and Enter
to save and quit.exit
command.On the Front End Server, <Security Server Proxy install path>\conf\ spring-jetty.xml
, comment out the excludeProtocols property:
<!— <property name="excludeProtocols" value="SSL,SSLv2,SSLv3" /> -->
excludeProtocols
property rather than removing it, so that down-negotiation can later be disabled. To later disable down-negotiation, remove from the excludeProtocols
property.
JAVA_HOME/lib/security/java.security
file:
jdk.tls.disabledAlgorithms=The fixed line is:SSLv3, RC4, DH keySize < 768
jdk.tls.disabledAlgorithms=RC4, DH keySize < 768
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.
Dell Encryption
08 Feb 2023
10
Solution