I'm attempting to limit the SSL cipher suites that are able to be used when connecting to an ActiveMQ broker by using the transport.enabledCipherSuites
attribute in the transportConnector
element. This is on a RHEL 7 server running ActiveMQ "Classic" 5.15.5 with OpenJDK 1.8.0_342.
Is it possible to limit the cipher suites that clients can connect to the ActiveMQ broker with on the broker side? If so, how does it work?
Here is my transportConnector
:
<transportConnectors>
<transportConnector name="ssl" uri="ssl://0.0.0.0:61616?transport.enabledCipherSuites=DHE-RSA-AES256-GCM-SHA384&transport.enabledProtocols=TLSv1.2&needClientAuth=true"/>
</transportConnectors>
The ActiveMQ service starts up, and port 61616
is binding properly. Testing the cipher using openssl
I am able to connect with a cipher other than the one specified.
Here is my openssl
command that I expect to fail, but it is connecting successfully:
openssl s_client -connect server.example.com:61616 -cipher 'ECDHE-RSA-AES256-GCM-SHA384'
Considering that everything is starting properly, I feel like I am misunderstanding what the transport.enabledCipherSuites
attribute is doing.