CrateDB versions earlier than 5.7.2 are exposed to the client initiated renegotiation vulnerability.
We have released CrateDB 5.7.2 with TLS renegotiation disabled by default.
See Client initialized Session-Renegotiation DoS · Advisory · crate/crate · GitHub for details.
To mitigate this issue on earlier versions, please use flag rejectClientInitiatedRenegotiation.
- If you use tarball distribution, use
CRATE_JAVA_OPTS="-Djdk.tls.rejectClientInitiatedRenegotiation=true" ./bin/crate - If you run CrateDB on Docker, add
--env CRATE_JAVA_OPTS="-Djdk.tls.rejectClientInitiatedRenegotiation=true"to yourdocker runcommand. - If you use package-based setup, add
CRATE_JAVA_OPTS="-Djdk.tls.rejectClientInitiatedRenegotiation=true"
to the/etc/default/cratefile. See also Configuration Settings — CrateDB: Guide