LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 08-02-2009, 10:56 AM   #1
abefroman
Senior Member
 
Registered: Feb 2004
Location: lost+found
Distribution: CentOS
Posts: 1,430

Rep: Reputation: 55
What exactly is a cipher and how can I block weak ones?


I am getting a warning with Nessus, saying my server supports weak SSL ciphers.

Code:
Synopsis :

The remote service supports the use of weak SSL ciphers.
Is this the clients half of an SSL connection? If so would this be based on his browser or OS? If so what OS/browsers uses weak ciphers by default?

And how can I reject connections using weak ciphers if I use openssl/apache.

TIA!
 
Old 08-02-2009, 01:20 PM   #2
acid_kewpie
Moderator
 
Registered: Jun 2001
Location: UK
Distribution: Gentoo, RHEL, Fedora, Centos
Posts: 43,417

Rep: Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985
Definition: http://en.wikipedia.org/wiki/Cipher

Depends what server is vulnerable as to what to do about it, for example here's another link I got about Apache in 3 seconds of searching, http://httpd.apache.org/docs/2.0/ssl/ssl_howto.html

Last edited by acid_kewpie; 08-02-2009 at 01:22 PM.
 
Old 08-02-2009, 01:21 PM   #3
welsh
LQ Newbie
 
Registered: Sep 2003
Posts: 1

Rep: Reputation: 1
It will be the browser from the client side but none of the modern browsers use weak encryption - ie less than 128-bit.

Wouldn't worry about it though it's just support there for older browsers which you won't use.
 
Old 08-02-2009, 01:59 PM   #4
acid_kewpie
Moderator
 
Registered: Jun 2001
Location: UK
Distribution: Gentoo, RHEL, Fedora, Centos
Posts: 43,417

Rep: Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985
Yeah I found the logic slightly odd when face with Nessus whining about this, as sure, there's a potential MITM issue when using a weak cipher, but that relies on that cipher being use in the first place, and that's pretty unlikely now. So unless you have a bad browser upgrade policy and what not, you're never actually vulnerable to ssl2 cipher issues anyway. I would say though that the browsers still generally *CAN* use sub 128bit ciphers - if a server only supports md5-des or such then you don't want to be blocked from accessing that server, good way to get a bad reputation as a browser, but they'd never get that low on the list unless the server is in that situation.

Last edited by acid_kewpie; 08-02-2009 at 02:00 PM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Affine Cipher Gato Azul Programming 3 02-01-2013 01:47 PM
gpg -c: which cipher-algo? mistersnorfles Linux - Security 3 08-08-2007 01:00 PM
Cipher all data xanax Linux - Security 9 12-10-2006 02:35 AM
Running Key Cipher Herrkutt Programming 6 11-21-2006 05:33 AM
LXer: 128-bit Block Cipher "Camellia" Announced as Open Source LXer Syndicated Linux News 0 04-19-2006 03:03 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 05:27 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration