Modifying NATIVE_NETWORK_ENCRYPTION option settings
After you enable the NATIVE_NETWORK_ENCRYPTION option, you can modify its
settings. Currently, you can modify NATIVE_NETWORK_ENCRYPTION option
settings only with the Amazon CLI or RDS API. You can't use the console. The following
example modifies two settings in the option.
aws rds add-option-to-option-group \ --option-group-name my-option-group \ --options "OptionName=NATIVE_NETWORK_ENCRYPTION,OptionSettings=[{Name=SQLNET.CRYPTO_CHECKSUM_TYPES_SERVER,Value=SHA256},{Name=SQLNET.CRYPTO_CHECKSUM_TYPES_SERVER,Value=SHA256}]" \ --apply-immediately
To learn how to modify option settings using the CLI, see Amazon CLI. For more information about each setting, see NATIVE_NETWORK_ENCRYPTION option settings.
Modifying CRYPTO_CHECKSUM_* values
If you modify NATIVE_NETWORK_ENCRYPTION option settings, make sure that the following option settings have at least one common cipher:
-
SQLNET.CRYPTO_CHECKSUM_TYPES_SERVER -
SQLNET.CRYPTO_CHECKSUM_TYPES_CLIENT
The following example shows a scenario in which you modify
SQLNET.CRYPTO_CHECKSUM_TYPES_SERVER. The configuration is valid because the
CRYPTO_CHECKSUM_TYPES_CLIENT and CRYPTO_CHECKSUM_TYPES_SERVER both use
SHA256.
| Option setting | Values before modification | Values after modification |
|---|---|---|
|
|
|
No change |
|
|
|
SHA1,MD5,SHA256 |
For another example, assume that you want to modify SQLNET.CRYPTO_CHECKSUM_TYPES_SERVER from
its default setting to SHA1,MD5. In this case, make sure you set
SQLNET.CRYPTO_CHECKSUM_TYPES_CLIENT to SHA1 or MD5. These
algorithms aren't included in the default values for SQLNET.CRYPTO_CHECKSUM_TYPES_CLIENT.
Modifying ALLOW_WEAK_CRYPTO* settings
To set the SQLNET.ALLOW_WEAK_CRYPTO* options from the default value to FALSE,
make sure that the following conditions are met:
-
SQLNET.ENCRYPTION_TYPES_SERVERandSQLNET.ENCRYPTION_TYPES_CLIENThave one matching secure encryption method. A method is considered secure if it's notDES,3DES, orRC4(all key lengths). -
SQLNET.CHECKSUM_TYPES_SERVERandSQLNET.CHECKSUM_TYPES_CLIENThave one matching secure checksumming method. A method is considered secure if it's notMD5. -
The client is patched with the July 2021 PSU. If the client isn't patched, the client loses the connection and receives the
ORA-12269error.
The following example shows sample NNE settings. Assume that you want to set
SQLNET.ENCRYPTION_TYPES_SERVER and SQLNET.ENCRYPTION_TYPES_CLIENT to FALSE,
thereby blocking non-secure connections. The checksum option settings meet the prerequisites because they
both have SHA256. However, SQLNET.ENCRYPTION_TYPES_CLIENT and
SQLNET.ENCRYPTION_TYPES_SERVER use the DES, 3DES, and
RC4 encryption methods, which are non-secure. Therefore, to set the
SQLNET.ALLOW_WEAK_CRYPTO* options to FALSE, first set
SQLNET.ENCRYPTION_TYPES_SERVER and SQLNET.ENCRYPTION_TYPES_CLIENT to a secure
encryption method such as AES256.
| Option setting | Values |
|---|---|
|
|
|
|
|
SHA1,MD5,SHA256 |
|
|
|
|
|
|