similar to: [Bug 2334] New: Warn when weak Ciphers are used

Displaying 20 results from an estimated 10000 matches similar to: "[Bug 2334] New: Warn when weak Ciphers are used"

2015 Jan 07
4
[Bug 2333] New: forbid old Ciphers, KexAlgorithms and MACs by default
https://bugzilla.mindrot.org/show_bug.cgi?id=2333 Bug ID: 2333 Summary: forbid old Ciphers, KexAlgorithms and MACs by default Product: Portable OpenSSH Version: 6.6p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: Miscellaneous Assignee:
2016 Oct 19
2
SSH Weak Ciphers
Am 19.10.2016 um 00:58 schrieb Gordon Messmer <gordon.messmer at gmail.com>: > On 10/18/2016 03:28 PM, Clint Dilks wrote: >> So first >> question is are people generally modifying the list of ciphers supported by >> the ssh client and sshd? > > I suspect that "generally" people are not. I do, because I can, and so that I can offer at least some advice
2016 Oct 18
7
SSH Weak Ciphers
Hi, In a recent security review some systems I manage were flagged due to supporting "weak" ciphers, specifically the ones listed below. So first question is are people generally modifying the list of ciphers supported by the ssh client and sshd? On CentOS 6 currently it looks like if I remove all the ciphers they are concerned about then I am left with Ciphers
2016 Oct 19
1
SSH Weak Ciphers
Once upon a time, Erik Laxdal <elaxdal at ece.uvic.ca> said: > The supported KexAlgorithms, Ciphers, and MACs are generally listed > in the sshd_config man page. So 'man sshd_config' then look for the > section of the item of interest. Note that the man page does not always match the actual compiled binary (the build process does not update the man page to match
2015 Apr 28
1
Disable weak ciphers in vnc_tls
Dear libvirt team, we a currently in a pci-dss certification process and our security scanner found weak ciphers in the vlc_tls service on our centos6 box: When I scan using sslscan I can see that sslv3 and rc4 is accepted: inf0rmix@tardis:~$ sslscan myhost:16514 | grep Accepted Accepted SSLv3 256 bits DHE-RSA-AES256-SHA Accepted SSLv3 256 bits AES256-SHA Accepted SSLv3 128
2016 Oct 18
0
SSH Weak Ciphers
On 10/18/2016 03:28 PM, Clint Dilks wrote: > So first > question is are people generally modifying the list of ciphers supported by > the ssh client and sshd? I suspect that "generally" people are not. I do, because I can, and so that I can offer at least some advice to people who aim to do so. > On CentOS 6 currently it looks like if I remove all the ciphers they are
2016 Oct 19
0
SSH Weak Ciphers
On 2016-10-19 03:11, Leon Fauster wrote: > Is there any command to find the supported list of KeyAlgos, MACs and > Ciphers for > the particular system (e.g. EL{5,6,7})? Similar to $ openssl ciphers > -v ... The supported KexAlgorithms, Ciphers, and MACs are generally listed in the sshd_config man page. So 'man sshd_config' then look for the section of the item of
2004 Apr 23
3
SSL Ciphers
I have dovecot running as a pop3s server on port 995 it works great with sendmail and I run nessus to check security issues nessus reports this The SSLv2 server offers 3 strong ciphers, but also 0 medium strength and 2 weak "export class" ciphers. The weak/medium ciphers may be chosen by an export-grade or badly configured client software. They only offer a limited protection against
2016 Oct 19
2
SSH Weak Ciphers
On 10/19/2016 08:30 AM, Leonard den Ottolander wrote: > Where did you get the idea that AES (~ Rijndael) is a weak cipher? It's not the cipher, but the mode. CBC has several known weaknesses in TLS, and is frequently regarded as potentially insecure as a result. https://www.openssl.org/~bodo/tls-cbc.txt
2016 Oct 19
0
SSH Weak Ciphers
Hello Gordon, On Wed, 2016-10-19 at 10:31 -0700, Gordon Messmer wrote: > On 10/19/2016 08:30 AM, Leonard den Ottolander wrote: > > Where did you get the idea that AES (~ Rijndael) is a weak cipher? > > > It's not the cipher, but the mode. CBC has several known weaknesses in > TLS, and is frequently regarded as potentially insecure as a result. > >
2016 Oct 19
0
SSH Weak Ciphers
Hello Clint, On Wed, 2016-10-19 at 11:28 +1300, Clint Dilks wrote: > The following weak client-to-server encryption algorithms are supported by > the remote service: > rijndael-cbc at lysator.liu.se > arcfour256 > arcfour128 > aes256-cbc > 3des-cbc > aes192-cbc > blowfish-cbc > cast128-cbc > arcfour > aes128-cbc Where did you get the idea that AES (~ Rijndael)
2014 Dec 02
2
disabling certain ciphers
Can you use both ssl_protocols *and* ssl_cipher_list in the same config (in a way that's sane)? ssl_protocols (>= 2.1) and ssl_cipher_list co-exist, or are they mutually exclusive? I have a Dovecot 2.2.13 system, and I tried setting: I also tried things like ssl_cipher_list = HIGH or ssl_cipher_list = HIGH:!MEDIUM:!LOW however, doing this seems to make v3 still work unless I
2019 Sep 30
4
Change ciphers on samba
Hello, I do vulnerability test on my infrastructure, and I get report about weak ciphers on samba services, is it possible to set stronger ciphers for samba? On old samba3 that was possible to set "ssl ciphers" in smb.conf, but now I don't see any documentation how to change it. Is it possible, if so, how? -- Arkadiusz Karpi?ski Efinity Sp. z o.o. 02-672 Warszawa, ul.
2013 Jul 16
1
curl ciphers name mapping openssl to curl format?
Hi All. In curl manual: --ciphers -> "(SSL) Specifies which ciphers to use in the connection. The list of ciphers must specify valid ciphers. Read up on SSL cipher list details on this URL:http://www.openssl.org/docs/apps/ciphers.html" In openssl: http://www.openssl.org/docs/apps/ciphers.html#CIPHER_SUITE_NAMES there are names such as "SSL_RSA_WITH_RC4_128_SHA RC4-SHA" but
2016 Oct 19
0
SSH Weak Ciphers
Alice Wonder wrote: > On 10/19/2016 11:34 AM, Leonard den Ottolander wrote: >> Hello Gordon, >> > *snip* >> >> Personally I would be more concerned whether or not to enable ECDSA >> algorithms (https://blog.cr.yp.to/20140323-ecdsa.html). >> > For web server ECDSA certs is currently a concern because the only > curves with popular support across
2016 Oct 20
0
SSH Weak Ciphers
Hello Alice, On Wed, 2016-10-19 at 13:40 -0700, Alice Wonder wrote: > On 10/19/2016 11:34 AM, Leonard den Ottolander wrote: > > Personally I would be more concerned whether or not to enable ECDSA > > algorithms (https://blog.cr.yp.to/20140323-ecdsa.html). > For web server ECDSA certs is currently a concern because the only > curves with popular support across browsers have
2016 Oct 20
0
SSH Weak Ciphers
Hello Alice, On Wed, 2016-10-19 at 14:22 -0700, Alice Wonder wrote: > I formerly used secp521r1 but suddenly Google with no warning stopped > supporting it in chrome. That company is too powerful. Actually this is something the NSA insists on:
2012 Apr 15
1
Legacy MACs and Ciphers: Why?
Why are legacy MACs (like md5-96), and legacy Ciphers (anything in cbc-mode, arcfour*(?)) enabled by default? My proposal would be to change the defaults for ssh_config and sshd_config to contain: MACs hmac-sha2-256,hmac-sha2-512,hmac-sha1 Ciphers aes128-ctr,aes192-ctr,aes256-ctr ...removing md5, truncated versions of sha1, umac64 (for which I can find barely any review), any cipher in cbc
2014 Jun 06
1
Patch: Ciphers, MACs and KexAlgorithms on Match
Hi all, this is a patch to make Ciphers, MACs and KexAlgorithms available in Match blocks. Now I can reach a -current machine with some Android terminal app without changing the default ciphers for all clients: Match Address 192.168.1.2 Ciphers aes128-cbc MACs hmac-sha1 KexAlgorithms diffie-hellman-group-exchange-sha1 Index: servconf.c
2009 Feb 26
2
openssh and SSLv2 ciphers
Hi, I am trying to confirm that openssh transmissions do not use any kind of SSLv2 ciphers. I have glanced through the code briefly, and I did not find any indication that any openssl ciphers are even being used (it appears that openssl is used primarily for RSA key generation and select other things). So openssh uses its own built-in ciphers instead, right? Thanks for the assistance, Steven