JIRA Mail initiates TLSv1 connection only
プラットフォームについて: Server および Data Center のみ。この記事は、Server および Data Center プラットフォームのアトラシアン製品にのみ適用されます。
サーバー*製品のサポートは 2024 年 2 月 15 日に終了しました。サーバー製品を利用している場合は、アトラシアンのサーバー製品のサポート終了のお知らせページにて移行オプションをご確認ください。
*Fisheye および Crucible は除く
Outdated- superseded by How to modify the TLS version Jira uses when connecting as a client
問題
JIRA Mail initiates Transport Layer Security (TLS) connection to Mail server, this includes IMAPS/POP3S or SMTPS protocols. It's TLSv1 connection and it's doesn't initiate TLSv1.1 or TLSv1.2. Taking into account that TLSv1 doesn't offer all the newest encryption cyphers, it's preferable to switch to TLSv1.2 protocol
診断
環境
- JIRA with configured Incoming and/or Outgoing mail.
Diagnostic Steps
Enable SSL debug option and check logs:
-Djavax.net.debug=ssl:handshake:verbose
You can see JIRA mail initiating TLSv1 connection:
*** ClientHello, TLSv1 http-bio-8080-exec-25 , WRITE: TLSv1 Handshake, length = 160 http-bio-8080-exec-25 , READ: TLSv1 Handshake, length = 91 *** ServerHello, TLSv1
in some cases connection can fail due to parametr mismatch:
*** ClientHello, TLSv1 atlassian-scheduler-quartz1.clustered_Worker-2, WRITE: TLSv1 Handshake, length = 163 atlassian-scheduler-quartz1.clustered_Worker-2, READ: SSLv3 Alert, length = 2 atlassian-scheduler-quartz1.clustered_Worker-2, RECV TLSv1.2 ALERT: fatal, illegal_parameter atlassian-scheduler-quartz1.clustered_Worker-2, called closeSocket() atlassian-scheduler-quartz1.clustered_Worker-2, handling exception: javax.net.ssl.SSLException: Received fatal alert: illegal_parameter
or fail due to No negotiable cipher suite:
*** ClientHello, TLSv1 atlassian-scheduler-quartz1.clustered_Worker-1, handling exception: javax.net.ssl.SSLHandshakeException: No negotiable cipher suite atlassian-scheduler-quartz1.clustered_Worker-1, SEND TLSv1.2 ALERT: fatal, description = handshake_failure atlassian-scheduler-quartz1.clustered_Worker-1, WRITE: TLSv1.2 Alert, length = 2
原因
JIRA for Incoming Mail (atlassian.mail.incoming.mailfetcherservice) and similar for outgoing uses javax.mail 1.4.5. This library uses it's own defaults for for TLS: 'sslsocket.setEnabledProtocols(new String[] {"TLSv1"});' and not global Java one.
ソリューション
You can override Java mail setting and set TLS to specific version, please add following JVM option to the startup parameters (see Setting Properties and Options on startup) :
-Dmail.imap.ssl.protocols="TLSv1.2"
-Dmail.smtp.ssl.protocols="TLSv1.2"
-Dmail.pop3.ssl.protocols="TLSv1.2"
See Package-summary.html#mail.imap.ssl.protocols for more details. Similar setting for SMTP: Smtp - package-summary
This should change TLS behaviour:
*** ClientHello, TLSv1.2
http-bio-8080-exec-25 , WRITE: TLSv1.2 Handshake, length = 216
http-bio-8080-exec-25 , READ: TLSv1.2 Handshake, length = 91
*** ServerHello, TLSv1.2