The only way I was able to make this go away was to disable TLS 1.2 completely, but that’s not really an option for me at the moment.
I tried playing with the Java jdk.tls.disabledAlgorithms options without success.
My current listener configuration looks like this:
Hi @Diego , thank you for your reply. You left out the important line out of the screenshot though . That would be the one starting with TLS 1.2 sig_algs offered:. Could you post your results with that line too? The part of the screenshot you shared looks the same as in mine.
I’m using the official Docker image hivemq/hivemq-ce:2024.6, so it will be the java version offered there which would be:
$ docker run --rm hivemq/hivemq-ce:2024.6 java --version
openjdk 21.0.3 2024-04-16 LTS
OpenJDK Runtime Environment Temurin-21.0.3+9 (build 21.0.3+9-LTS)
OpenJDK 64-Bit Server VM Temurin-21.0.3+9 (build 21.0.3+9-LTS, mixed mode, sharing)
Hi @Diego,
thank you. That is a good explanation of why it is not a bug in testssl that this warning is shown (i.e. the information is relevant) and also a good source is provided to better understand how cipher suites names are generated.
It however provides no argument as to why this warning may be ignored. I am still very much interested in finding a way to stop the HiveMQ broker to provide support for RSA+SHA1, which is insecure. Do you have an idea how may this be accomplished? I tried modifying the Java options on the HiveMQ Broker with -Djdk.tls.disabledAlgorithms="SHA1" and other combinations, but had no success.
Many thanks again for the support.
I didn’t get you since as far as I understand you will not generate certificates that use the SHA1withRSA signature algorithm but after conducting several tests, I discovered that you can achieve your goal by specifying the appropriate Signature Schemes that can be used over the TLS protocol.
Please ensure that you evaluate the proposed solution within the context of your own risks and assumptions, as I have not conducted extensive testing on it.
Thank you so much! That is exactly what I was looking for, but wasn’t able to find. My goal was to disable insecure signature schemes.
Much appreciated.