Sponsored Content
Special Forums Cybersecurity How to Disable Ciphers and Reconfigure Encryption? Post 302538990 by fpmurphy on Thursday 14th of July 2011 08:07:58 PM
Old 07-14-2011
This should work for you:
Code:
openssl ciphers -v DEFAULT

 

8 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

File encryption/Key encryption ????

My dilemma, I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies

2. AIX

How to disable encryption below 128 bit in Websphere ?

Hi, Hi I have setup Websphere Portal and Apache server on Solaris. The problem is that clients are allowed to negotiate lower encryption levels and by default the Websphere Apache HTTP server accepts 56-bit keys (your Firefox client requested 256-bit AES below). So How to disable... (0 Replies)
Discussion started by: neel.gurjar
0 Replies

3. Solaris

Q:x4270_m2 reconfigure PCI card to slot 5?

Hello all, I have a problem with my x4270_m2 server. I have a GBE lan built into the back of my server and I have a QGE pci card in slot 2 to be used as a redundant. My server is not picking up the QGE lan card in slot2. From investigation of the /etc/path_to_inst, which shows: #grep e1000... (2 Replies)
Discussion started by: kerrygold
2 Replies

4. Cybersecurity

Weak Security Ciphers

Hi All * Need some help on testing if a server supports weak ciphers . Here is the command I ran : openssl s_client -connect HOSTNAME:443 -cipher LOW:EXP result : Connected : err num=110 openssl s_client -connect HOSTNAME:8000 -cipher LOW:EXP result : Connected : err... (0 Replies)
Discussion started by: noufel
0 Replies

5. OS X (Apple)

Weak Security Ciphers

Hi All * Need some help on testing if a server supports weak ciphers . Here is the command I ran : openssl s_client -connect HOSTNAME:443 -cipher LOW:EXP result : Connected : err num=110 openssl s_client -connect HOSTNAME:8000 -cipher LOW:EXP result : Connected : err... (1 Reply)
Discussion started by: noufel
1 Replies

6. Cybersecurity

SSH ciphers help

Hello, One of my co-worker changed our the ssh ciphers that we currently use. We made a change to /etc/ssh/ssh_config on our Solaris 10 servers. Security said that we have to use aes128-ctr or higher, but not aes128-cbc. The issue is that many of the ssh clients (Tectia) on Windows will not... (0 Replies)
Discussion started by: bitlord
0 Replies

7. Cybersecurity

File encryption tools with MAC address as an encryption key

Hi all, I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS. For example: when A wants to send file to B A will encrypt the file with B's computer MAC/IP address as an encryption key This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies

8. Solaris

Need to disable CBC mode cipher encryption along with MD5 & 96 bit MAC algorithm

Hi All Is any one know how to diable CBC mode cipher encryption along with MD5 & 96 bit MAC algorithm in solaris 10. Regards (4 Replies)
Discussion started by: amity
4 Replies
CURLOPT_PROXY_SSL_CIPHER_LIST(3)			     curl_easy_setopt options				  CURLOPT_PROXY_SSL_CIPHER_LIST(3)

NAME
CURLOPT_PROXY_SSL_CIPHER_LIST - specify ciphers to use for proxy TLS SYNOPSIS
#include <curl/curl.h> CURLcode curl_easy_setopt(CURL *handle, CURLOPT_PROXY_SSL_CIPHER_LIST, char *list); DESCRIPTION
Pass a char *, pointing to a zero terminated string holding the list of ciphers to use for the connection to the HTTPS proxy. The list must be syntactically correct, it consists of one or more cipher strings separated by colons. Commas or spaces are also acceptable separators but colons are normally used, !, - and + can be used as operators. For OpenSSL and GnuTLS valid examples of cipher lists include 'RC4-SHA', 'SHA1+DES', 'TLSv1' and 'DEFAULT'. The default list is normally set when you compile OpenSSL. You'll find more details about cipher lists on this URL: https://www.openssl.org/docs/apps/ciphers.html For NSS, valid examples of cipher lists include 'rsa_rc4_128_md5', 'rsa_aes_128_sha', etc. With NSS you don't add/remove ciphers. If one uses this option then all known ciphers are disabled and only those passed in are enabled. You'll find more details about the NSS cipher lists on this URL: http://git.fedorahosted.org/cgit/mod_nss.git/plain/docs/mod_nss.html#Directives The application does not have to keep the string around after setting this option. DEFAULT
NULL, use internal default PROTOCOLS
All EXAMPLE
TODO AVAILABILITY
Added in 7.52.0 If built TLS enabled. RETURN VALUE
Returns CURLE_OK if TLS is supported, CURLE_UNKNOWN_OPTION if not, or CURLE_OUT_OF_MEMORY if there was insufficient heap space. SEE ALSO
CURLOPT_PROXY_SSLVERSION(3), CURLOPT_USE_SSL(3), CURLOPT_SSLVERSION(3), libcurl 7.54.0 December 21, 2016 CURLOPT_PROXY_SSL_CIPHER_LIST(3)
All times are GMT -4. The time now is 03:34 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy