Sponsored Content
Full Discussion: Secure XMPP on CentOS
Special Forums Cybersecurity Secure XMPP on CentOS Post 302896311 by frank.einstein on Sunday 6th of April 2014 01:49:51 PM
Old 04-06-2014
Linux Secure XMPP on CentOS

Hello all, I have a problem with my XMPP server at security tests result that sslv3 must be disabled and RC4 also weak ciphers on 112 and 128 bits...

OS: CentOS
XMPP platform: ejabberd 2.1.13

Security test result
Code:
https://xmpp.net/result.php?domain=hackyard.net&type=client

ejabberd use openssl and I really don't know how to disable sslv3 tlsv1 rc4 and weak ciphers..

I do not have nothing in ejabberd.cfg regarding this.. and I would like somehow to secure my server.
 

6 More Discussions You Might Find Interesting

1. Solaris

Secure Rmount

We run Solaris 8 and now Solaris 10. I would like to create a secure share on my rman server that I could put backups directly on the rman server. They will then get backed up to tape. Does anyone have any suggestions on how I can do this? Thanks. (0 Replies)
Discussion started by: gandolf989
0 Replies

2. Solaris

Secure FTP Problem using Sun SSH on Client system F-Secure on Server system

I am using shell script to do secure ftp. I have done key file setup to do password less authentication. Following are the FTP Details: FTP Client has Sun SSH. FTP Server has F-Secure. I am using SCP Command to do secure copy files. When I am doing this, I am getting the foll error scp:... (2 Replies)
Discussion started by: ftpguy
2 Replies

3. IP Networking

Secure Network

OK Guys I need help. I have a very small network (lets say x.y.z.0 - x.y.z.255). Now I do not have any control over the router. But I am in control of the switch that splits the network from one single physical line (wire). I have a bridge fire wall between the line and the switch that filters out... (1 Reply)
Discussion started by: disturbe_d
1 Replies

4. UNIX for Advanced & Expert Users

Which is the most secure *nix?

Which is the most secure *nix for home business/ office use? Would have to be fairly well up to date browser and drivers wise. Myself I seem to have settled on RedHat - I've trialled the Desktop, and am part-way through a server trial. I've essentially not managed to keep the browser as secure... (2 Replies)
Discussion started by: GSO
2 Replies

5. UNIX for Dummies Questions & Answers

Secure copy help

I want to use scp in a script and have two questions: 1. Is there a way to use password in script, so script does not halt and ask for my password for remote box half way through? 2. The code below copies the file to my home directory on the remote server. How can I copy "file" to the same... (3 Replies)
Discussion started by: chrisjones
3 Replies

6. Red Hat

How to Upgrade Centos 5.7 using Centos 5.8 ISO image on Vmware workstation

Dear Linux Experts, On my windows 7 desktop with the help of Vmware workstation (Version 7.1), created virtual machine and installed Centos 5.7 successfully using ISO image. Query : Is this possible to upgrade the Centos 5.7 using Centos 5.8 ISO image to Centos version 5.8?.. if yes kindly... (2 Replies)
Discussion started by: Ananthcn
2 Replies
rc4(3SSL)							      OpenSSL								 rc4(3SSL)

NAME
RC4_set_key, RC4 - RC4 encryption SYNOPSIS
#include <openssl/rc4.h> void RC4_set_key(RC4_KEY *key, int len, const unsigned char *data); void RC4(RC4_KEY *key, unsigned long len, const unsigned char *indata, unsigned char *outdata); DESCRIPTION
This library implements the Alleged RC4 cipher, which is described for example in Applied Cryptography. It is believed to be compatible with RC4[TM], a proprietary cipher of RSA Security Inc. RC4 is a stream cipher with variable key length. Typically, 128 bit (16 byte) keys are used for strong encryption, but shorter insecure key sizes have been widely used due to export restrictions. RC4 consists of a key setup phase and the actual encryption or decryption phase. RC4_set_key() sets up the RC4_KEY key using the len bytes long key at data. RC4() encrypts or decrypts the len bytes of data at indata using key and places the result at outdata. Repeated RC4() calls with the same key yield a continuous key stream. Since RC4 is a stream cipher (the input is XORed with a pseudo-random key stream to produce the output), decryption uses the same function calls as encryption. Applications should use the higher level functions EVP_EncryptInit(3) etc. instead of calling the RC4 functions directly. RETURN VALUES
RC4_set_key() and RC4() do not return values. NOTE
Certain conditions have to be observed to securely use stream ciphers. It is not permissible to perform multiple encryptions using the same key stream. SEE ALSO
blowfish(3), des(3), rc2(3) HISTORY
RC4_set_key() and RC4() are available in all versions of SSLeay and OpenSSL. 1.0.1e 2013-02-11 rc4(3SSL)
All times are GMT -4. The time now is 05:26 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy