Enable and Disable Secure Protocols and Cipher Suites
The Jetty configuration for inbound connections to IDM supports a number of protocols and cipher suites.
Enabled protocols are explicitly listed in the includeProtocols
list in the conf/jetty.xml
file. Only TLSv1.2
and TLSv1.3
are enabled by default:
... <Array id= "includedProtocols" type="java.lang.String"> <!-- Only support TLS v1.2 and v1.3 --> <Item>TLSv1.2</Item> <Item>TLSv1.3</Item> </Array> ...
To disable a particular protocol, remove it from the includedProtocols
list. To add support for a weaker protocol, add it to the list, for example:
... <Array id= "includedProtocols" type="java.lang.String"> <Item>TLSv1.2</Item> <Item>TLSv1.3</Item> <Item>SSLv3.0</Item> </Array> ...
Important
It is highly recommended that you do not enable weaker protocols such as SSL, and TLS versions prior to 1.2. These protocols use outdated algorithms and are generally considered insecure.
Enabled cipher suites for each protocol are listed in the includedCipherSuites
list in conf/jetty.xml
:
... <Array id="includedCipherSuites" type="java.lang.String"> <!-- TLS 1.3 cipher suites --> <Item>TLS_AES_128_GCM_SHA256</Item> <Item>TLS_AES_256_GCM_SHA384</Item> <Item>TLS_CHACHA20_POLY1305_SHA256</Item> <!-- TLS 1.2 cipher suites --> <Item>TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384</Item> <Item>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</Item> <Item>TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256</Item> <Item>TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384</Item> <Item>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</Item> <Item>TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256</Item> <Item>TLS_DHE_RSA_WITH_AES_256_GCM_SHA384</Item> <Item>TLS_DHE_RSA_WITH_AES_128_GCM_SHA256</Item> </Array> ...
To add support for additional cipher suites, add them as <Item>
s in this list.