Extreme strongly recommends updating and replacing certificates used on Extreme Control for SHA256 or higher. Deprecation and discontinued use of SHA1 is an industry-wide progression which Extreme is now implementing.
The following workaround can be applied to re-enable SHA1 support in Extreme Control. Extreme does not recommend wide-spread use of or reliance of this workaround. It is provided and available as a temporary solution assuming a migration from SHA1 to SHA256 (or above) is underway.
Please note that the workaround
must be applied on each individual Access Control Engine
. After the workaround is applied, restart or re-enforce each Access Control Engine to effect the change.
-
Log into Control via SSH.
cd /etc/ssl
cp openssl.cnf openssl.cnf.original
-
Add the following entries to the
openssl.cnf
file.
-
Add the bold-highlighted line under the HOME / RANDFILE statements as shown:
# This definition stops the following lines choking if HOME isn't
# defined.
HOME = .
RANDFILE = $ENV::HOME/.rnd
openssl_conf = default_conf
-
Add the following text to the bottom of the file as shown:
[ default_conf ]
ssl_conf = ssl_sect
[ssl_sect]
system_default = system_default_sect
[system_default_sect]
MinProtocol = TLSv1.1
CipherString = DEFAULT:@SECLEVEL=1