Hello,
We are hosting an application which uses RabbitMQ on a Windows system.
A vulnerability scanner found that on port 15671 that TLS1.1 is enabled.
In the rabbitmq.conf file we have the following.
#listeners.tcp.default = 5671
# logging to file and/or to an exchange
# log.dir = C:\\temp
log.file = rabbit.log
# log.file = false
log.file.level = error
# log.exchange = true
# log.exchange.level = error
listeners.ssl.default = 5671
ssl_options.versions.1 = tlsv1.2
#ssl_options.versions.2 = tlsv1.1
ssl_options.verify = verify_peer
ssl_options.fail_if_no_peer_cert = false
ssl_options.cacertfile = C:\\RabbitMq\\ca_2023.pem
ssl_options.certfile = C:\\RabbitMq\\cert_2023.pem
ssl_options.keyfile = C:\\RabbitMq\\cert_2023.key
management.ssl.port = 15671
management.ssl.cacertfile = C:\\RabbitMq\\ca_2023.pem
management.ssl.certfile = C:\\RabbitMq\\cert_2023.pem
management.ssl.keyfile = C:\\RabbitMq\\cert_2023.key
listeners.tcp = none
However, if I run
rabbitmq-diagnostics --silent tls_versions
I receive the following back
tlsv1.3
tlsv1.2
tlsv1.1
tlsv1
also using OpenSSL I can connect using TLS1.1
openssl s_client -connect
10.142.189.180:15671 -tls1_1
What am I missing?