IBM UrbanCode Deploy supports
multiple SSL protocols and ciphers for communication between servers.
IBM UrbanCode Deploy supports
TLSv1, TLSv1.1, and TLSv1.2 SSL protocols. IBM UrbanCode Deploy supports
only the SSLv3 protocol if older agents require its use. See Upgrading agents.
Note: Limiting and disabling SSL and TLS protocols and ciphers is done at the JVM level rather than
the application level.
IBM UrbanCode Deploy uses
SSL in communication between the web UI and the server and between
servers that use ActiveMQ. The SSL certificates that control both
types of communication use the Java™ KeyStore
(JKS) format. The certificates are generated by an RSA key with a
2048-bit length and are signed by a SHA256withRSA algorithm.
- By default, the web UI connects on port 8443. You find its certificate in the
opt/tomcat/conf/tomcat.keystore directory. See SSL configuration.
- By default, ActiveMQ connects on port 7918. You find its SSL certificate in the
app_data/conf/server.keystore directory. See
Configuring mutual authentication.
The list of SSL ciphers you can use depends on which ciphers the Java crypto provider of the JRE
supports on which you installed your UrbanCode Deploy server, relay and agent.
IBM Java 8 with the IBMJSSE2 crypto provider support: https://www.ibm.com/support/knowledgecenter/SSYKE2_8.0.0/com.ibm.java.security.component.80.doc/security-component/jsse2Docs/ciphersuites.html
Oracle/OpenJDK Java 8 with the SUN crypto provider support: https://docs.oracle.com/javase/8/docs/technotes/guides/security/StandardNames.html#ciphersuites
The following SSL cipher suites are enabled by default:
- ECDH_ECDSA_WITH_AES_128_CBC_SHA
- ECDH_ECDSA_WITH_AES_128_CBC_SHA256
- ECDH_ECDSA_WITH_AES_128_GCM_SHA256
- ECDH_ECDSA_WITH_AES_256_CBC_SHA
- ECDH_ECDSA_WITH_AES_256_CBC_SHA384
- ECDH_ECDSA_WITH_AES_256_GCM_SHA384
- ECDH_RSA_WITH_AES_128_CBC_SHA
- ECDH_RSA_WITH_AES_128_CBC_SHA256
- ECDH_RSA_WITH_AES_128_GCM_SHA256
- ECDH_RSA_WITH_AES_256_CBC_SHA
- ECDH_RSA_WITH_AES_256_CBC_SHA384
- ECDH_RSA_WITH_AES_256_GCM_SHA384
- ECDHE_ECDSA_WITH_AES_128_CBC_SHA
- ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
- ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
- ECDHE_ECDSA_WITH_AES_256_CBC_SHA
- ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
- ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- ECDHE_RSA_WITH_AES_128_CBC_SHA
- ECDHE_RSA_WITH_AES_128_CBC_SHA256
- ECDHE_RSA_WITH_AES_128_GCM_SHA256
- ECDHE_RSA_WITH_AES_256_CBC_SHA
- ECDHE_RSA_WITH_AES_256_CBC_SHA384
- ECDHE_RSA_WITH_AES_256_GCM_SHA384
- RSA_WITH_AES_128_CBC_SHA
- RSA_WITH_AES_128_CBC_SHA256
- RSA_WITH_AES_128_GCM_SHA256
- RSA_WITH_AES_256_CBC_SHA
- RSA_WITH_AES_256_CBC_SHA256
- RSA_WITH_AES_256_GCM_SHA384
- RSA_WITH_CAMELLIA_128_CBC_SHA
- RSA_WITH_CAMELLIA_128_CBC_SHA256
- RSA_WITH_CAMELLIA_256_CBC_SHA
- RSA_WITH_CAMELLIA_256_CBC_SHA256