SSL Cipher Configuration - removing weak ciphers

KB Home   |   SSL Cipher Configuration - removing weak ciphers

This article is written for security or network specialists and a certain level of security expertise is assumed.

By default, PaperCut is configured to allow a variety of SSL ciphers with the aim of supporting the widest array of browsers and operating systems possible. When a client connects to the server, the two communicate and pick the best/most secure cipher that the two mutually support. Some organizations may choose to disable some ciphers on the server-side to comply with policies such as PCI-DSS recommendations. Reducing the available ciphers may limit the support for older browsers, however this may not be a concern in a standardized and up-to-date environment.

An often asked question is how to manage SSL cipher lists used by the PaperCut application server. This question may arise in response to the desire of continuously reviewing and strengthening security infrastructure and ciphers in use in any particular deployment (such as mitigating potential attack via the BEAST SSL vulnerability CVE-2011-3389) or in order to implement a security policy such as support for Perfect Forward Secrecy in TLS communications.

The process to configure these settings have been improved in recent versions. Check below to find the instructions specific to your version of PaperCut. When making any changed be absolutely certain to follow best practices while testing as certain settings may prevent older clients from printing or legacy MFPs from connecting to the PaperCut server.

Configure the SSL cipher order preference (version 17.1 and above)

By default, the SSL cipher order preference is set to client cipher order. You can, however, configure the SSL cipher order preference to be server cipher order. Specifying server cipher order allows you to control the priority of ciphers that can be used by the SSL connections from the clients.

  1. In a text editor, open the following file:
  2. Locate the line starting with cipher preference: client
  3. Change client to server (cipher preference: server).
  4. Save the file.
  5. Restart the PaperCut Application Server service.

Version 17 and above

SSL Protocols and Cipher Suites can be easily configured by editing the file found in the application directory. Uncomment the two lines at the bottom of the section SSL Protocols/Ciphers starting with #lines server.ssl.disabled-protocols and #server.ssl.disabled-cipher-suites by removing the proceeding # signs. See example below:

### SSL Protocols/Ciphers ###
# All allowed SSL protocols and cipher suites
# Refer to
# Eg. To use only TLS protocols and drop RC4 enabled by default, use the following:
server.ssl.disabled-protocols=SSLv2Hello, SSLv3

After modifying and saving this file restart the application server for the changes to apply.

Take care and test thoroughly if you are running a fleet of MFD devices with PaperCut MF. Whilst some MFDís do not support all TLS versions, most will support TLS v1.0. It is possible that some older MFDís may require SSL 3.0 and the above configuration change will block HTTPS connections from these devices.

Version 14 and above

As of PaperCut version 14.0 we have upgraded the underlying runtime to Java 7. This offers improved flexibility when trying to accomplish the goals of precise control over the use of ciphers and applies globally to the JVM without needing to configure the Jetty web server. This applies to inbound communications. In addition Java 7 also offers TLS 1.2 support.

The Java 7 platform now provides a user facing mechanism that allows cipher suites to be excluded from use via a security policy file called thatís located under Java Runtime Environment in the [app-path]/[JRE]/lib/security directory. PaperCut places its Java Runtime under [app-path]/runtime folder with minor variation due to system specifics, eg: [app-path]/runtime/win64/jre on 64 bit Windows for example and [app-path]/runtime/jre on 32 bit.

Note that currently customizations are not kept across upgrades and any changes will need to be reapplied.

The policy file defines the jdk.tls.disabledAlgorithms property to control TLS cipher selection. There is also a complementary property jdk.certpath.disabledAlgorithms to control algorithms encountered in SSL certificates.

You can find the documentation for this property on the Oracle website: JSSE Reference Guide

As an example the following more secure policy default can be applied: jdk.tls.disabledAlgorithms=MD5, SHA1, DSA, RSA keySize < 2048

This means: no MD5, no SHA1, no DSA. RSA is allowed only if the key is at least 2048 bits long.

This property can be customized to further tailor a site deployment to specific needs. For example as a starting point ďexportĒ strength ciphers as well as DES/3DES and MD5 based cipher suites can be removed.

To improve the security of the allowed ciphers it’s possible to disallow SHA1 and RC4, however this may come at the cost of breaking compatibility with some Windows XP based software (eg Windows XP itself didnít include SHA2 support by default until Windows XP SP3).

One can find all the cipher suites enabled by default in Java 7 here: Default Cipher Suites in Java 7 (unless the default SunJSSE crypto provider has been explicitly overridden and is not used).

Please note that if AES-256 encryption is selected then this will also require obtaining “Unlimited Strength Jurisdiction Policy files” from the Oracle Java Download Page

Earlier versions

We have developed a plugin that will allow configuration of the cipher list in older versions of PaperCut (version 11 through 13). The plugin configures connections at the Jetty (embedded HTTP server and servlet engine).

The PaperCut plugin architecture has been utilized to deliver an immediate solution for all versions of PaperCut back to version 11. The advantage of taking this plugin approach is that it allows sites to modify the cipher list immediately without the need to schedule an upgrade of an operation production system. The plugin can be applied to any edition of PaperCut with minimal impact, functional change risk, and downtime.

It is intended that an experienced system administrator install and configure this plugin, with careful testing required after implementation. Download the plugin Jetty Config Plugin here:

Unzip the contents; installation and configuration steps are outlined in the README-JETTY-CONFIG.txt. In summary, the process will involve:

  1. Unzip
  3. Copy the following files to [app-path]\server\lib-ext
    1. jetty-config.plugin
    2. jetty-config-plugin.jar
  4. Open the file in your preferred text editor and append the list of ciphers to exclude. Save the file.
  5. Restart the PaperCut Application Server service and re-test with an appropriate security scanning tool.

TIP: After installing the plugin, the list of ciphers supported by your server will be reported in the [app-path]\server\logs\server.log file at startup. This list may be used to identify the name of included and excluded ciphers.

Other Considerations

Perfect Forward Secrecy

One other security concept worth discussion is operating in “Perfect Forward Secrecy” mode (PFS), to achieve this all communications should be based on PFS based cipher suites. These cipher suites are special in the sense that they split off the responsibility of mutual authentication and key exchange that occurs in an SSL handshake over to multiple sets of cryptographic keys.

This means that only a subset of data sent between two points is vulnerable at any given time as a different key is used for each session as opposed to all of the communications that may have occurred if say the RSA key was used for both authentication and key exchange. This comes at some processing cost however. Furthermore the session key is not transmitted or saved so will not be available to recovery from a hard drive for example.

In order to accomplish this it is required to cull the list of cipher suites quite dramatically and only allow those that are based on DHE and ECDHE families. These correspond to Diffie-Hellman with ephemeral keys and DHE based on elliptic curve cryptography.

Having only forward secrecy compliant cipher suites enabled you have achieved forward secrecy in TLS handshakes but the degree of that secrecy varies as some forward secrecy ciphers can still use weaker keys. Java places a few limitations on DH key sizes still (locked to 768-bits).

Something to keep in mind is currently it’s not possible to to define a preferred cipher order on the server side so while the chosen cipher will be selected from the cut down list, which one will depend on the client connecting to the server at least to some degree.

In summary PFS operation mode can be achieved but with varying degree of strength and tinkering is required. The number of potentially compatible clients will also decrease as the cipher suites are reduced.


In addition to connections between web clients and the PaperCut application server in PaperCut MF we have to interface with various copiers and devices created by third parties. The cryptographic technology on these devices varies and sometimes lags behind current best practice. In some extreme cases this means that we cannot simply increase various security parameters such as certificate key sizes, signature algorithms and allowed SSL ciphers across the board without breaking communication with these devices.

Currently we offer these notes as guidance on how to lock down and fine tune the secure communications, with a word of caution on potentially breaking compatibility with other applications. Thorough testing is strongly recommended and the results will vary based specific fleet of devices, models and firmware versions in use.

This is a complex topic and the security-focused team at PaperCut Software are available to offer advice or assist with configuration if required.

For more information about legacy ciphers refer to: Legacy Ciphers In PaperCut

Categories: Security

Keywords: SSL Cipher, CBC, MD5, short bit


Share your findings and experience with other PaperCut users. Feel free to add comments and suggestions about this Knowledge Base article. Please don't use this for support requests.

Article last modified on May 10, 2017, at 06:10 AM
Printable View   |   Article History   |   Edit Article