Security scanning team identified a sev. 4 vulnerability (QID 38142) - SSL Server Allows Anonymous Authentication Vulnerability on TCP port 509 which belongs to dxserver component:
# netstat -ntulp | grep :509
tcp 0 0 <ip address>:509 0.0.0.0:* LISTEN 3545545/dxserver
udp 0 0 0.0.0.0:509 0.0.0.0:* 3545545/dxserver
Would you please provide your statement if it is possible to mitigate this vulnerability? Suggested action from Qualys is this: "Disable support for anonymous authentication to mitigate this vulnerability."
Release : 12.0
Component : Embedded Entitlements Manager
You can configure a cipher of your wish so that 509 starts communicating with that cipher and does not allow NULL ciphers.
This can be done in the following dxc file.
/opt/CA/Directory/dxserver/config/ssld/itechpoz.dxc
#
# eiam repository
#
set ssl = {
cert-dir = "config/ssld/personalities"
ca-file = "config/ssld/itechpoz-trusted.pem"
cipher = "ECDHE-RSA-AES256-GCM-SHA384"
protocol = tls
};
OpenSSL s_client request output after enabling ECDHE cipher
#openssl s_client -connect <eem hostname>:509 -cipher aNULL
WARNING: can't open config file: C:/OpenSSL/openssl.cnf
CONNECTED(00000238)
25612:error:140790E5:SSL routines:ssl23_write:ssl handshake failure:s23_lib.c:177:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 0 bytes and written 170 bytes
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : 0000
Session-ID:
Session-ID-ctx:
Master-Key:
Key-Arg : None
PSK identity: None
PSK identity hint: None
SRP username: None
Start Time: 1638514009
Timeout : 300 (sec)
Verify return code: 0 (ok)
...
cipher = "ECDHE-RSA-AES256-GCM-SHA384"
Certificates were generated upon the installation as follows:
[<EEM hostname]>modifycerts
INFO - Enter Certificate Key Length [default = 1024]
INFO - [1] 1024
INFO - [2] 2048
INFO - [3] 4096
Select key length from [1 - 3] : 2
Enter Digest Algorithm [default = SHA256]
INFO - Enter Digest Algorithm [default = SHA256]
INFO - [1] SHA1
INFO - [2] SHA256
INFO - [3] SHA384
INFO - [4] SHA512
Select Digest algorithm from [1 - 4] : 2
=======================================================
INFO - Summary
=======================================================
INFO - Upgrading all certificates to key length: [2048]
INFO - Upgrading all certificates to [digest algorithm : SHA256]