We are using jgroups and a new requirement has come up to restrict the enabled ciphers and forbid all AES 128 related ciphers including jgroups SSL_KEY_EXCHANGE, port 2175.
I tried to configure it via jvm parameters jdk.tls.server.cipherSuites and jdk.tls.client.cipherSuites. I tried to validate the changes with nmap (nmap --script ssl-enum-ciphers -Pn -p 2157 <ID>) but I still saw AES 128 related items.
I tried to investigate it and I found the following:
As I can see with this approach SSL_KEY_EXCHANGE will ignore all jvm level cipher restrictions.
My proposal would be to introducing a new property where the user can customize the list of ciphers. If it is null the current logic would be used. If you don't have any concerns I'm happy to prepare the code change.