pcsd allows TLS secure client-initiated renegotiation on port 2224

Solution Verified - Updated -

Issue

  • pcsd allows TLS secure client-initiated renegotiation on port 2224.
  • Penetration test says pcsd may be vulnerable to DoS attacks.
  • Penetration test revealed the following vulnerability:

Secure Client-Initiated Renegotiation allowed on port 2224 (Pacemaker): The remote service encrypts traffic using TLS and permits clients to renegotiate TLS connections. The handshake is only performed at the beginning of a secure connection to establish it. When TLS renegotiation is enabled on the server, a user is allowed to send a renegotiation request, which initiates a new handshake. The computational requirements for renegotiating a connection are asymmetrical between the client and the server, with the server performing at least ten times more processing power than on the client.

Environment

  • Red Hat Enterprise Linux Server 6 (with the High Availability Add-on)
  • Pacemaker

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.

Current Customers and Partners

Log in for full access

Log In
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.