Sponsored Content
Special Forums Cybersecurity How to Disable Ciphers and Reconfigure Encryption? Post 302507615 by stringman on Thursday 24th of March 2011 10:30:02 AM
Old 03-24-2011
How to Disable Ciphers and Reconfigure Encryption - SOLVED

DraconianTimes,

Thanks for the response and sorry it has taken me so long to get back. I put this on the backburner for a while to attend other issues.

I believe I have fixed the problem. We are running Samba and our server is only a domain server. I used the following command to meet requirements:

Code:
 
openssl ciphers -v SSLv3+MEDIUM+HIGH:!SSLv2:!aNULL:!eNULL:@STRENGTH

This enables only SSLv3 ciphers of 128 bit encrytion and higher, disables all others, including null ciphers and sorts the output by by strength. I am still able to SSH into the server via Putty and login over the network. If I run into other problems, I can always loosen it back up. There were 18 encryption algorythms running on our server that were 64-bit or less. Thanks again.

Ken
These 2 Users Gave Thanks to stringman For This Post:
 

8 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

File encryption/Key encryption ????

My dilemma, I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies

2. AIX

How to disable encryption below 128 bit in Websphere ?

Hi, Hi I have setup Websphere Portal and Apache server on Solaris. The problem is that clients are allowed to negotiate lower encryption levels and by default the Websphere Apache HTTP server accepts 56-bit keys (your Firefox client requested 256-bit AES below). So How to disable... (0 Replies)
Discussion started by: neel.gurjar
0 Replies

3. Solaris

Q:x4270_m2 reconfigure PCI card to slot 5?

Hello all, I have a problem with my x4270_m2 server. I have a GBE lan built into the back of my server and I have a QGE pci card in slot 2 to be used as a redundant. My server is not picking up the QGE lan card in slot2. From investigation of the /etc/path_to_inst, which shows: #grep e1000... (2 Replies)
Discussion started by: kerrygold
2 Replies

4. Cybersecurity

Weak Security Ciphers

Hi All * Need some help on testing if a server supports weak ciphers . Here is the command I ran : openssl s_client -connect HOSTNAME:443 -cipher LOW:EXP result : Connected : err num=110 openssl s_client -connect HOSTNAME:8000 -cipher LOW:EXP result : Connected : err... (0 Replies)
Discussion started by: noufel
0 Replies

5. OS X (Apple)

Weak Security Ciphers

Hi All * Need some help on testing if a server supports weak ciphers . Here is the command I ran : openssl s_client -connect HOSTNAME:443 -cipher LOW:EXP result : Connected : err num=110 openssl s_client -connect HOSTNAME:8000 -cipher LOW:EXP result : Connected : err... (1 Reply)
Discussion started by: noufel
1 Replies

6. Cybersecurity

SSH ciphers help

Hello, One of my co-worker changed our the ssh ciphers that we currently use. We made a change to /etc/ssh/ssh_config on our Solaris 10 servers. Security said that we have to use aes128-ctr or higher, but not aes128-cbc. The issue is that many of the ssh clients (Tectia) on Windows will not... (0 Replies)
Discussion started by: bitlord
0 Replies

7. Cybersecurity

File encryption tools with MAC address as an encryption key

Hi all, I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS. For example: when A wants to send file to B A will encrypt the file with B's computer MAC/IP address as an encryption key This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies

8. Solaris

Need to disable CBC mode cipher encryption along with MD5 & 96 bit MAC algorithm

Hi All Is any one know how to diable CBC mode cipher encryption along with MD5 & 96 bit MAC algorithm in solaris 10. Regards (4 Replies)
Discussion started by: amity
4 Replies
SESS_ID(1)							      OpenSSL								SESS_ID(1)

NAME
sess_id - SSL/TLS session handling utility SYNOPSIS
openssl sess_id [-inform PEM|DER] [-outform PEM|DER] [-in filename] [-out filename] [-text] [-noout] [-context ID] DESCRIPTION
The sess_id process the encoded version of the SSL session structure and optionally prints out SSL session details (for example the SSL session master key) in human readable format. Since this is a diagnostic tool that needs some knowledge of the SSL protocol to use prop- erly, most users will not need to use it. -inform DER|PEM This specifies the input format. The DER option uses an ASN1 DER encoded format containing session details. The precise format can vary from one version to the next. The PEM form is the default format: it consists of the DER format base64 encoded with additional header and footer lines. -outform DER|PEM This specifies the output format, the options have the same meaning as the -inform option. -in filename This specifies the input filename to read session information from or standard input by default. -out filename This specifies the output filename to write session information to or standard output if this option is not specified. -text prints out the various public or private key components in plain text in addition to the encoded version. -cert if a certificate is present in the session it will be output using this option, if the -text option is also present then it will be printed out in text form. -noout this option prevents output of the encoded version of the session. -context ID this option can set the session id so the output session information uses the supplied ID. The ID can be any string of characters. This option wont normally be used. OUTPUT
Typical output: SSL-Session: Protocol : TLSv1 Cipher : 0016 Session-ID: 871E62626C554CE95488823752CBD5F3673A3EF3DCE9C67BD916C809914B40ED Session-ID-ctx: 01000000 Master-Key: A7CEFC571974BE02CAC305269DC59F76EA9F0B180CB6642697A68251F2D2BB57E51DBBB4C7885573192AE9AEE220FACD Key-Arg : None Start Time: 948459261 Timeout : 300 (sec) Verify return code 0 (ok) Theses are described below in more detail. Protocol this is the protocol in use TLSv1, SSLv3 or SSLv2. Cipher the cipher used this is the actual raw SSL or TLS cipher code, see the SSL or TLS specifications for more information. Session-ID the SSL session ID in hex format. Session-ID-ctx the session ID context in hex format. Master-Key this is the SSL session master key. Key-Arg the key argument, this is only used in SSL v2. Start Time this is the session start time represented as an integer in standard Unix format. Timeout the timeout in seconds. Verify return code this is the return code when an SSL client certificate is verified. NOTES
The PEM encoded session format uses the header and footer lines: -----BEGIN SSL SESSION PARAMETERS----- -----END SSL SESSION PARAMETERS----- Since the SSL session output contains the master key it is possible to read the contents of an encrypted session using this information. Therefore appropriate security precautions should be taken if the information is being output by a "real" application. This is however strongly discouraged and should only be used for debugging purposes. BUGS
The cipher and start time should be printed out in human readable form. SEE ALSO
ciphers(1), s_server(1) 0.9.7a 2000-02-03 SESS_ID(1)
All times are GMT -4. The time now is 01:25 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy