Sponsored Content
Operating Systems Solaris Need to disable CBC mode cipher encryption along with MD5 & 96 bit MAC algorithm Post 302979091 by amity on Tuesday 9th of August 2016 07:36:12 AM
Old 08-09-2016
Need to disable CBC mode cipher encryption along with MD5 & 96 bit MAC algorithm

Hi All

Is any one know how to diable CBC mode cipher encryption along with MD5 & 96 bit MAC algorithm in solaris 10.


Regards
 

7 More Discussions You Might Find Interesting

1. Cybersecurity

MD5 to DES encryption

Is it possible to change the type of encryption from MD5 to DES without removing a user? Way back when this server was created, users were created with the MD5 encryption. Now, all users created with DES encryption. Is it possible to just change the type of password encryption? Users using... (1 Reply)
Discussion started by: Larsonist
1 Replies

2. AIX

How to disable encryption below 128 bit in Websphere ?

Hi, Hi I have setup Websphere Portal and Apache server on Solaris. The problem is that clients are allowed to negotiate lower encryption levels and by default the Websphere Apache HTTP server accepts 56-bit keys (your Firefox client requested 256-bit AES below). So How to disable... (0 Replies)
Discussion started by: neel.gurjar
0 Replies

3. Solaris

md5 encryption on solaris 8

is there patches enable passwords of greater than 8 characters with only md5 encryption (rather than the older crypt) for solaris 8. I am migrating a number of solaris 8 domains to branded zones. (1 Reply)
Discussion started by: frustin
1 Replies

4. Cybersecurity

How to Disable Ciphers and Reconfigure Encryption?

Hello, I recently had a Retina scan of my system and there are some findings I do not understand. SSL Week Cipher Strength Supported - Retina has detected that the targeted SSL Service supports a cryptographically weak cipher strength... Disable ciphers that support less than 128-bit... (4 Replies)
Discussion started by: stringman
4 Replies

5. Cybersecurity

File encryption tools with MAC address as an encryption key

Hi all, I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS. For example: when A wants to send file to B A will encrypt the file with B's computer MAC/IP address as an encryption key This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies

6. Solaris

Solaris 8 MD5 encryption support

Hi, I did some NIS migration tests recently. The target is to migrate the NIS server from Solaris 8 to Redhat Linux 6.5. And, I found there are encryption issues while Linux NIS using MD5 hashing password for authentication whereas Solaris 8 clients using DES encryption. It causes issues... (3 Replies)
Discussion started by: bestard
3 Replies

7. UNIX for Advanced & Expert Users

Disabling CBC Cipher mode causes login problems

Hi, As part of the security hardening activity in our team, we have to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption. To do this, in sshd_config I comment out these lines : Ciphers aes128-cbc,blowfish-cbc,3des-cbc MACS hmac-sha1,hmac-md5 and add... (9 Replies)
Discussion started by: anaigini45
9 Replies
Convert::PEM::CBC(3pm)					User Contributed Perl Documentation				    Convert::PEM::CBC(3pm)

NAME
Convert::PEM::CBC - Cipher Block Chaining Mode implementation SYNOPSIS
use Convert::PEM::CBC; my $cbc = Convert::PEM::CBC->new( Cipher => 'Crypt::DES_EDE3', Passphrase => 'foo' ); my $plaintext = 'foo bar baz'; $cbc->encrypt($plaintext); DESCRIPTION
Convert::PEM::CBC implements the CBC (Cipher Block Chaining) mode for encryption/decryption ciphers; the CBC is designed for compatability with OpenSSL and may not be compatible with other implementations (such as SSH). USAGE
$cbc = Convert::PEM::CBC->new(%args) Creates a new Convert::PEM::CBC object and initializes it. Returns the new object. %args can contain: o Cipher Either the name of an encryption cipher class (eg. Crypt::DES), or an object already blessed into such a class. The class must support the keysize, blocksize, encrypt, and decrypt methods. If the value is a blessed object, it is assumed that the object has already been initialized with a key. This argument is mandatory. o Passphrase A passphrase to encrypt/decrypt the content. This is different in implementation from a key (Key), because it is assumed that a passphrase comes directly from a user, and must be munged into the correct form for a key. This "munging" is done by repeatedly computing an MD5 hash of the passphrase, the IV, and the existing hash, until the generated key is longer than the keysize for the cipher (Cipher). Because of this "munging", this argument can be any length (even an empty string). If you give the Cipher argument an object, this argument is ignored. If the Cipher argument is a cipher class, either this argument or Key must be provided. o Key A raw key, to be passed directly to the new cipher object. Because this is passed directly to the cipher itself, the length of the key must be equal to or greater than the keysize for the Cipher. As with the Passphrase argument, if you give the Cipher argument an already-constructed cipher object, this argument is ignored. If the Cipher argument is a cipher class, either this argument or Passphrase must be provided. o IV The initialization vector for CBC mode. This argument is optional; if not provided, a random IV will be generated. Obviously, if you're decrypting data, you should provide this argument, because your IV should match the IV used to encrypt the data. $cbc->encrypt($plaintext) Encrypts the plaintext $plaintext using the underlying cipher implementation in CBC mode, and returns the ciphertext. If any errors occur, returns undef, and you should check the errstr method to find out what went wrong. $cbc->decrypt($ciphertext) Decrypts the ciphertext $ciphertext using the underlying cipher implementation in CBC mode, and returns the plaintext. If any errors occur, returns undef, and you should check the errstr method to find out what went wrong. $cbc->iv Returns the current initialization vector. One use for this might be to grab the initial value of the IV if it's created randomly (ie. you haven't provided an IV argument to new): my $cbc = Convert::PEM::CBC->new( Cipher => $cipher ); my $iv = $cbc->iv; ## Generated randomly in 'new'. Convert::PEM uses this to write the IV to the PEM file when encrypting, so that it can be known when trying to decrypt the file. $cbc->errstr Returns the value of the last error that occurred. This should only be considered meaningful when you've received undef from one of the functions above; in all other cases its relevance is undefined. AUTHOR &; COPYRIGHTS Please see the Convert::PEM manpage for author, copyright, and license information. perl v5.10.1 2010-12-07 Convert::PEM::CBC(3pm)
All times are GMT -4. The time now is 10:23 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy