- Mark as New
- Subscribe to RSS Feed
- Permalink
‎14 May 2018 09:32 PM - last edited on ‎16 Jun 2023 12:39 PM by Karolina_Linda
Dynatrace managed is enabled on TLSv1 and v1.1 on the user communication port 443. We are required to disable both. How can we do that? I tested the port 8443 for OneAgent communication, and only TLSv1.2 is enabled.
Solved! Go to Solution.
- Labels:
-
dynatrace managed
- Mark as New
- Subscribe to RSS Feed
- Permalink
‎15 May 2018 02:47 AM
In /opt/dynatrace-managed/server/conf/config.properties file, the line "ssl-protocols=TLSv1.2" is set, but TLSv1 and TSLv1.1 are not disabled. Do we have similar option to disable them as we did in AppMon dtfrontendserver.ini and dtserver.ini by passing "-Dcom.dynatrace.diagnostics.ssl.protocols.unsafe=TLSv1,TLSv1.1" ?
- Mark as New
- Subscribe to RSS Feed
- Permalink
‎15 May 2018 09:50 AM
In case of Dynatrace Managed, the 443/tcp port (in recent versions, I think it is from v136) is handled by bundled NGINX. Settings in server's config.properties are not applied for nginx.
Actually, it's just a matter of adding:
ssl_protocols TLSv1.2;
To the config file /opt/dynatrace-managed/nginx/conf/nginx.conf and restart the nginx. Add the line after the existing ssl settings.
If you have a multinode cluster, you will have to do that on every node.
- Mark as New
- Subscribe to RSS Feed
- Permalink
‎30 May 2018 09:10 PM
Which section we need to add this parameter in config.properties ?
- Mark as New
- Subscribe to RSS Feed
- Permalink
‎31 May 2018 08:03 AM
It's not in config.properties, but in nginx.conf.
- Mark as New
- Subscribe to RSS Feed
- Permalink
‎15 May 2018 12:28 PM
It works. The test from openssl returns "Secure Renegotiation IS NOT supported" on TLSv1 and 1.1. Nice. Thanks so much Julius!
- Mark as New
- Subscribe to RSS Feed
- Permalink
‎18 Jul 2018 02:23 PM
It comes to another problem that auto-update keeps overwriting nginx configuration, so TLSv1.0 and v1.1 Vulnerability keeps coming back. Every time I have to manually fix it. Can Dynatrace Vendor permanently fix this issue in the new updates/releases?
- Mark as New
- Subscribe to RSS Feed
- Permalink
‎19 Jul 2018 07:14 AM
Did you open a support ticket for that? This forum answer can get unnoticed.
- Mark as New
- Subscribe to RSS Feed
- Permalink
‎04 Nov 2018 04:07 PM
Hi Charles,
Did you get any fix from dynatrace support.We are also having same issue every time new updates/releases happening we are loosing TLSv1.2 Vulnerabilities and TLSv1.0 & 1.1 coming back.
Can you please let us know if you receive any fix.
Appreciate your help.
Tarun
- Mark as New
- Subscribe to RSS Feed
- Permalink
‎07 Nov 2018 09:46 PM
No. Not sure if our Dynatrace sales engineer submitted a case for this, and I had to update the config file right after every update. Now I just submitted a "RFE - Please remediate SSL Vulnerability on Dynatrace managed to have TLSv1.2 enabled only" in the Dynatrace product ideas. Please go there to vote, so we can get it fixed soon. Thanks for the reminder.
- Mark as New
- Subscribe to RSS Feed
- Permalink
‎17 Aug 2022 02:17 PM
You can find an answer to this question in our documentation:
in the section "SSL certificates parameters"