Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SSL CIPHER too weak #159

Open
konvergence opened this issue Feb 21, 2018 · 3 comments
Open

SSL CIPHER too weak #159

konvergence opened this issue Feb 21, 2018 · 3 comments

Comments

@konvergence
Copy link

Hi Mike,

I tested the supported cipher by openvas, but these ciphers are too weak.
Do you plan to allow more secure cipher list ?

Here the current list of acceptable ciphers on openvas :

Testing AES256-GCM-SHA384...YES
Testing AES256-SHA256...YES
Testing AES256-SHA...YES
Testing CAMELLIA256-SHA...YES
Testing AES128-GCM-SHA256...YES
Testing AES128-SHA256...YES
Testing AES128-SHA...YES
Testing CAMELLIA128-SHA...YES
Testing DES-CBC3-SHA...YES
@mikesplain
Copy link
Owner

Hi @konvergence please take a look at this PR and see if it addresses your issue: #156

This was just merged in and is in the process of being built and deployed.

@konvergence
Copy link
Author

Hi Mike,

I get well the new restricted ciphers :

Testing AES256-GCM-SHA384...YES
Testing AES256-SHA256...YES
Testing AES256-SHA...YES
Testing CAMELLIA256-SHA...YES
Testing AES128-GCM-SHA256...YES

But regarding to https://www.ssllabs.com/ssltest/analyze.html, it's steell to weak

TLS_RSA_WITH_AES_256_CBC_SHA256 (0x3d)   WEAK | 256
TLS_RSA_WITH_AES_256_GCM_SHA384 (0x9d)   WEAK | 256
TLS_RSA_WITH_AES_256_CBC_SHA (0x35)   WEAK | 256
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (0x84)   WEAK | 256
TLS_RSA_WITH_AES_128_GCM_SHA256 (0x9c)   WEAK | 128

Is it possible to allow the same ciphers with ECDHE or DHE mode ? for example :

ECDHE-RSA-AES256-GCM-SHA384
DHE-RSA-AES256-GCM-SHA384
DHE-RSA-AES256-SHA256
ECDHE-RSA-AES256-SHA
DHE-RSA-AES128-GCM-SHA256 

@konvergence
Copy link
Author

sorry I did'nt want to close

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants