Does anyone know if there is a way to configure the TLS 1.2 security in BigFix 9.x to use Elliptic Curve Cryptography? Specifically I have a U.S. Government requirement to use the following suite
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 as defined in RFC 4289
I don’t know that the suite for TLS is configurable.
I also am not sure i’ve ever seen a requirement to use an exact cryptographic method – normally a family or set of them are approved like FIPS Compliant, etc.
Can you share more about your set of requirements?
US Government intelligence community and DoD entities, depending on the network, have a firm requirement to use the “Suite B” set of encryption algorithms and standards that include Elliptic Curve and Diffie Hellman algorithms.
I hope that this helps.
These algorithms are all available in OpenSSL. I was hoping that since BigFix used OpenSSL on its Linux server version it was just a matter of some reconfiguration of the server to enforce the suite B standards
You may need to file an RFE for this if it isn’t supported in the product already.
If you do file an RFE, include a link to this forum post in the RFE and provide a link to the RFE in a reply to this forum post so that we can go vote on it.
While there are some configuration options that allow for modifying the cipher suites leveraged by the platform, they are not currently so granular as to allow the use of a very specific cipher. This is certainly something we can explore, and if there’s interest, please do review and vote for the RFE.
@fossl: You can configure TLS 1.2 in Bigfix 9.X via Bigfix Administrator tool>> Security >> Enable Enhanced Security
Enables or disables the enhanced security that adopts the SHA-256
cryptographic digest algorithm for all digital signatures as well as content
verification and the TLS 1.2 protocol for communications among the BigFix
components.
I came across this old post and noticed taht the question is related to the TLS Diffie-Hellman (ECDHE) support. This requirement is going to be addressed in version 10 patch 1. Stay tuned !