Changing Logjam configuration property
The Logjam configuration parameter is LOGJAM_DHKEYSIZE_2048_BITS_ENABLED
. The default value is LOGJAM_DHKEYSIZE_2048_BITS_ENABLED: true
.
You can set the parameter value to true
or false
.
Set LOGJAM_DHKEYSIZE_2048_BITS_ENABLED
to true
to avoid Logjam security vulnerability attack to disallow SHA-1 and Diffie-Hellman key exchange (DH) that is less than 2048 bits.
Following are the steps to change the value:
Changing the parameter value by using kubectl
-
Install the
kubectl
CLI. -
Edit the
platform-auth-idp
ConfigMap.kubectl -n ibm-common-services edit configmap platform-auth-idp
-
Change the following attribute values as required:
- Set
LOGJAM_DHKEYSIZE_2048_BITS_ENABLED
totrue
orfalse
.
- Set
-
Save and close the ConfigMap.
-
Restart the
auth-idp
podskubectl -n ibm-common-services delete pod -l k8s-app=auth-idp
-
Wait for some time. Then, check the status of the
auth-idp
pods. The status must show as4/4 Running
for all the pods.kubectl -n ibm-common-services get pods | grep auth-idp
Changing the parameter values by using the console
- Log in to the OpenShift Container Platform console as a user with cluster administrator access.
- From the navigation menu, click Workloads > Config Maps.
- Search for
platform-auth-idp
. - Click ... > Edit Config Map.
- Change the
LOGJAM_DHKEYSIZE_2048_BITS_ENABLED
parameter value totrue
orfalse
. - Click Submit.
- From the navigation menu, click Workloads > Deployments.
- Locate
auth-idp
. - Click ... > Edit Deployment. A window for editing displays.
- Click Save without making any change. This step is to reload the
auth-idp
pods with the latest ConfigMap values. - Click
auth-idp
. - Wait for some time. Then, check the status of the
auth-idp
pods in the Pods pane. The status of all the pods must show as4/4
under the Ready field name.