I have seen a few references here to the use of
Code: Select all
tls-version=only-1.2
I am attempting to address this point:
Should issuing the command:2.1.1 Medium 443/tcp
Medium (CVSS: 5.9)
NVT: SSL/TLS: Report Weak Cipher Suites
Product detection result
cpe:/a:ietf:transport_layer_security
Detected by SSL/TLS: Report Supported Cipher Suites (OID: 1.3.6.1.4.1.25623.1.0.
→֒802067)
Summary
This routine reports all weak SSL/TLS cipher suites accepted by a service.
Quality of Detection (QoD): 98%
Vulnerability Detection Result
'Weak' cipher suites accepted by this service via the TLSv1.0 protocol:
TLS_RSA_WITH_RC4_128_SHA
'Weak' cipher suites accepted by this service via the TLSv1.1 protocol:
TLS_RSA_WITH_RC4_128_SHA
'Weak' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_RSA_WITH_RC4_128_SHA
Impact
This could allow remote attackers to obtain sensitive information or have other, unspeci ed
impacts.
Solution:
Solution type: Mitigation
The configuration of this services should be changed so that it does not accept the listed weak
cipher suites anymore.
Please see the references for more resources supporting you with this task.
Code: Select all
> ip service set api-ssl tls-version=only-1.2
Am I missing something fundamental here? What is the correct approach to preventing the use of those older 'Weak' cipher suites in TLS1.0 and 1.1?
I guess ideally I should use only TLS1.3 to pass this test. Can the be done another way, other than the tls-version command?