Skupper - SWEET32 - How can I specify available ciphers #1414
Replies: 5 comments 11 replies
-
Can you confirm which component this was for? I.e. the router or the service-controller? |
Beta Was this translation helpful? Give feedback.
-
Hi, thanks in advance for your help. Both the service-controller and router services are exposed and both have the same weak cipher issue. |
Beta Was this translation helpful? Give feedback.
-
I'm not sure I understand your analysis. When I test the ciphers returned. I get this response which clearly calls out 3DES ciphers vulnerable to SWEET32 PORT STATE SERVICE |
Beta Was this translation helpful? Give feedback.
-
For the router it will use whatever ciphers are available via the openssl library installed on the platform (sorted by key length - longest preferred). You can use the "openssl ciphers" command to list all the ciphers available on the platform running the router. |
Beta Was this translation helpful? Give feedback.
-
There's something wrong. I'm not seeing the connection to openssl you're describing in your analysis. Running openssl -v from inside the skupper-router container yields this: openssl ciphers -v Running against the skupper-router service: nmap -sV --script ssl-enum-ciphers -p 55671 x.y.z.a PORT STATE SERVICE VERSION Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . |
Beta Was this translation helpful? Give feedback.
-
Our recent scans have identified skupper using weak ciphers.
SSL Medium Strength Cipher Suites Supported (SWEET32)
CVE-2016-2183
How can we restrict the available ciphers skupper permits?
Beta Was this translation helpful? Give feedback.
All reactions