Security scanner software returns the following vulnerability on TCP port 5673. Can I configure SystemLink Server to not exhibit this vulnerability?
QID: 38596 TLS Protocol Session Renegotiation Security Vulnerability CVE-2009-3555
Follow these steps to modify the configuration of the RabbitMQ that SystemLink Server installs to disable client negotiation-- that should resolve the flagged vulnerability QID:38596.
{ssl_options, [ {certfile, "C:/ProgramData/National Instruments/Skyline/Certificates/rabbitmq-server/rabbitmq-server.cer"}, {keyfile, "C:/ProgramData/National Instruments/Skyline/Certificates/rabbitmq-server/key/rabbitmq-server.key"}, {verify, verify_none}, {fail_if_no_peer_cert, false} ]},
{ssl_options, [ {certfile, "C:/ProgramData/National Instruments/Skyline/Certificates/rabbitmq-server/rabbitmq-server.cer"}, {keyfile, "C:/ProgramData/National Instruments/Skyline/Certificates/rabbitmq-server/key/rabbitmq-server.key"}, {verify, verify_none}, {client_renegotiation, false}, {fail_if_no_peer_cert, false} ]},
NOTE: if you run rabbitmqconfig.exe manually, it will overwrite these changes in the configuration.
Collaborate with other users in our discussion forums
A valid service agreement or active software subscription may be required, and support options vary by country.
Helpful
Not Helpful