Alex,
A recent scan targeted at the web service revealed the following weak ciphers. Is there a way to disable these?
SSLv3
TLS_RSA_WITH_DES_CBC_SHA - weak
TLS_RSA_WITH_IDEA_CBC_SHA - weak
TLSv1
TLS_RSA_WITH_DES_CBC_SHA - weak
TLS_RSA_WITH_IDEA_CBC_SHA - weak
Regards
Disable Weak Ciphers in Web Service
We are dealing with more respectable high profile clients and do not want to give them any room to question our security practices or conduct surprize audits on our services.
Aside from weak ciphers the web service reports other vulnerabilities we would like to see addressed.
https://www.ssllabs.com/ssltest/analyze ... Results=on
Regards
Aside from weak ciphers the web service reports other vulnerabilities we would like to see addressed.
https://www.ssllabs.com/ssltest/analyze ... Results=on
Regards
Ok, we will add couple more options.
Regards
Alex
"see addressed"? Like option to disble SSL v2.0 and renegotiation?Aside from weak ciphers the web service reports other vulnerabilities we would like to see addressed.
https://www.ssllabs.com/ssltest/analyze ... Results=on
Regards
Alex
Correct.
1. Disable SSL v2.
2. Disable client initiated renegotiation.
3. Disable insecure renegotiation.
4. Prioritize RC4 to mitigate the BEAST attack. Practical mitigation requires that servers speak only RC4 when using TLS v1.0 or SSL v3.
With these options added any type of audit should pass.
Regards
1. Disable SSL v2.
2. Disable client initiated renegotiation.
3. Disable insecure renegotiation.
4. Prioritize RC4 to mitigate the BEAST attack. Practical mitigation requires that servers speak only RC4 when using TLS v1.0 or SSL v3.
With these options added any type of audit should pass.
Regards
Hi Alex,
I appreciate you including this request within the 9.38 update.
However, I am unable to get it working.
1. I ugraded the installation using the installer.
2. Aded the changes to the misc secion of the webservice.ini
3. Restarted webservice.
4. Audi results in no changes made.
Please advise.
[Misc]
DisableDES=1
Disable3DES=1
DisableIDEA=1
DisableMD5=1
DisableSSLv2=1
DisableExport40=1
I appreciate you including this request within the 9.38 update.
However, I am unable to get it working.
1. I ugraded the installation using the installer.
2. Aded the changes to the misc secion of the webservice.ini
3. Restarted webservice.
4. Audi results in no changes made.
Please advise.
[Misc]
DisableDES=1
Disable3DES=1
DisableIDEA=1
DisableMD5=1
DisableSSLv2=1
DisableExport40=1
-
- Posts: 2832
- Joined: Tue May 16, 2006 4:41 am
- Contact:
Using the ssl section was the answer.
The release notes read to use the misc section instead.
Some observations.
1. While there are no ciphers enabled for sslv2, it is still enabled.
2. Disabling ciphers and prioritizing rc4 on top is a start however the other vulnerabilities still exist such as non secure and client initiated renegotiation.
3. Even though rc4 sha is on top, the beast vulnerability still exists.
Regards
The release notes read to use the misc section instead.
Some observations.
1. While there are no ciphers enabled for sslv2, it is still enabled.
2. Disabling ciphers and prioritizing rc4 on top is a start however the other vulnerabilities still exist such as non secure and client initiated renegotiation.
3. Even though rc4 sha is on top, the beast vulnerability still exists.
Regards