How to secure Bamboo against Poodle by disabling SSLV3

Platform Notice: Data Center Only - This article only applies to Atlassian products on the Data Center platform.

Note that this KB was created for the Data Center version of the product. Data Center KBs for non-Data-Center-specific features may also work for Server versions of the product, however they have not been tested. Support for Server* products ended on February 15th 2024. If you are running a Server product, you can visit the Atlassian Server end of support announcement to review your migration options.

*Except Fisheye and Crucible

Summary

Disabling SSLV3 in Bamboo instances utilizing a Tomcat container in order to secure against the Poodle Exploit.

Solution

  1. Stop Bamboo server,

  2. Edit the <Bamboo server installation directory>/conf/server.xml file:

    server.xml

    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 <Connector port="8085" protocol="HTTP/1.1" maxThreads="150" minSpareThreads="25" connectionTimeout="20000" disableUploadTimeout="true" acceptCount="100" enableLookups="false" maxHttpHeaderSize="8192" useBodyEncodingForURI="true" URIEncoding="UTF-8" redirectPort="8443"> <UpgradeProtocol className="org.apache.coyote.http2.Http2Protocol" /> </Connector>

    Please note these are default values, yours may look different.

  3. Add the following to the connector:

    1 sslEnabledProtocols="TLSv1.2,TLSv1.1,TLSv1"
  4. Start Bamboo server.

This should do it for Bamboo running default in Tomcat container.

Extra Strength Protection

Consider updating the ciphers Tomcat is using

In-Depth Linux SSLV3 Dive

Updated on April 2, 2025

Still need help?

The Atlassian Community is here for you.