<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: OCI 7.0.1 SSL  - SHA-1 vs SHA-256 in Active IQ Unified Manager Discussions</title>
    <link>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/OCI-7-0-1-SSL-SHA-1-vs-SHA-256/m-p/105642#M18668</link>
    <description>&lt;P&gt;Matt, this is super helpful, and I'll definitely need to bookmark this for when we actually get 7.1 installed. The OCI client is really only used by a handful of people, and can only be gotten-to in one of two ways, so I bet I could control the Java environment around it (hashtag Famous Last Words).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From one liberal arts undergraduate to another, I thank you.&lt;/P&gt;</description>
    <pubDate>Thu, 28 May 2015 21:33:58 GMT</pubDate>
    <dc:creator>SMLocke</dc:creator>
    <dc:date>2015-05-28T21:33:58Z</dc:date>
    <item>
      <title>OCI 7.0.1 SSL  - SHA-1 vs SHA-256</title>
      <link>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/OCI-7-0-1-SSL-SHA-1-vs-SHA-256/m-p/105640#M18666</link>
      <description>&lt;P&gt;Hello, comrades. Our security vulnerabilitiy scanner has flagged my OCI servers with a vulnerability related to SSL and SHA-1 hashing. The remediation measure prescribed is to stop using a SHA-1 hashed certificate, and use one hashed with SHA-256 instead.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm currently running 7.0.1, but I've scheduled an upgrade to 7.1 in the next few weeks for reasons unrelated to SSL. I sort of hope&amp;nbsp;this upgrade (and a subsequent switching-off of SSLv3 and switching-on of TLS on the filer) will automagically sort out my SHA-1 vulnerability as well. What does the community think? Wishful thinking?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2025 04:12:42 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/OCI-7-0-1-SSL-SHA-1-vs-SHA-256/m-p/105640#M18666</guid>
      <dc:creator>SMLocke</dc:creator>
      <dc:date>2025-06-05T04:12:42Z</dc:date>
    </item>
    <item>
      <title>Re: OCI 7.0.1 SSL  - SHA-1 vs SHA-256</title>
      <link>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/OCI-7-0-1-SSL-SHA-1-vs-SHA-256/m-p/105641#M18667</link>
      <description>&lt;P&gt;SMLocke,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ugh.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No, OCI 7.1.0's out of the box ciphers have not changed from OCI 7.0.[0-2]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Part of the difficulty with ciphers is:&lt;/P&gt;&lt;P&gt;Exportable software can only ship with certain ones.&lt;/P&gt;&lt;P&gt;Java 7 defaults to TLS 1.0 enabled, TLS 1.1 and 1.2 disabled. Certain ciphers won't work with TLS 1.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;OCI 7.0.3 is actually chronologically more recent than 7.1.0. In 7.0.3, we changed the default ciphers to&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Notice how those end in SHA, and not SHA___ ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, 7.0.3 moves away from ciphers that use RC4 because that is a bad thing. It doesn't change the picture on using SHA-1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Aside - I have a BA in Political Science. Keep that in mind before any crypto advice from me&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I actually in my testing have built a .xls of the various ciphers Java supports, which work with which TLS version, and which are exportable.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SHA256 and higher *only* work with TLS 1.2, which means if you are using Java 7 with a default configuration, you will break the client if you switch ciphers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you guarantee that:&lt;/P&gt;&lt;P&gt;All Java 7 installs have been adjusted to enable TLS 1.2 (checkbox in Java control panel) OR&lt;/P&gt;&lt;P&gt;All OCI Java client users are using Java 8, which has TLS 1.2 enabled by default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if so navigate to,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;..\SANscreen\jboss\server\onaro\deploy\jbossweb.sar&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Make a backup of server.xml&amp;nbsp; to your My Documents folder, then edit server.xml&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Look for&lt;/P&gt;&lt;P&gt;ciphers = "SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;7.1.0 / 7.0.[0-2]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;will have that line - as discussed above, the ciphers are different in 7.0.3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Change the ciphers line to&lt;/P&gt;&lt;P&gt;ciphers = "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Save the file&lt;/P&gt;&lt;P&gt;Restart the "SANscreen Server" service&lt;/P&gt;&lt;P&gt;In 3-5 minutes, all the services should be back online. Confirm you can get into the OCI Java client, and confirm all OCI Acquisition Units are talking to OCI&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If things break, remember that you took cipher advice from a pre-sales engineer with a liberal arts degree, and laugh. And back out the change you made, restart the services, and open a support case&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Sep 2015 14:49:24 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/OCI-7-0-1-SSL-SHA-1-vs-SHA-256/m-p/105641#M18667</guid>
      <dc:creator>ostiguy</dc:creator>
      <dc:date>2015-09-16T14:49:24Z</dc:date>
    </item>
    <item>
      <title>Re: OCI 7.0.1 SSL  - SHA-1 vs SHA-256</title>
      <link>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/OCI-7-0-1-SSL-SHA-1-vs-SHA-256/m-p/105642#M18668</link>
      <description>&lt;P&gt;Matt, this is super helpful, and I'll definitely need to bookmark this for when we actually get 7.1 installed. The OCI client is really only used by a handful of people, and can only be gotten-to in one of two ways, so I bet I could control the Java environment around it (hashtag Famous Last Words).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From one liberal arts undergraduate to another, I thank you.&lt;/P&gt;</description>
      <pubDate>Thu, 28 May 2015 21:33:58 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/OCI-7-0-1-SSL-SHA-1-vs-SHA-256/m-p/105642#M18668</guid>
      <dc:creator>SMLocke</dc:creator>
      <dc:date>2015-05-28T21:33:58Z</dc:date>
    </item>
  </channel>
</rss>

