We have several vulnerabilities that are related to weak ciphers and need to know how to disable the weak ciphers. Below is a copy of the vulnerability reported.
This is impacting all of the DevTest services, registry, portal, VSE, etc.
For a SSL enabled port, the scanner probes and maintains a list of supported SSL/TLS versions. For each supported version, the scanner does a SSL handshake to get a list of KEX methods supported by the server. It reports all KEX methods that are considered weak and List all server supported ciphers for each weak key exchange method supported by Server.
The criteria of a weak KEX method is as follows:
The SSL/TLS server supports key exchanges that are cryptographically weaker than recommended. Key exchanges should provide at least 112 bits of security, which translates to a minimum key size of 2048 bits for Diffie Hellman and RSA key exchanges or 224 bits for Elliptic Curve Diffie Hellman key exchanges.
| PROTOCOL | CIPHER | NAME | GROUP | KEY-SIZE | FORWARD-SECRET | CLASSICAL-STRENGTH | QUANTUM-STRENGTH |
| TLSv1.2 | DHE-RSA-AES256-GCM-SHA384 | DHE | 1024 | yes | 80 | low | |
| TLSv1.2 | DHE-RSA-AES128-GCM-SHA256 | DHE | 1024 | yes | 80 | low | |
| TLSv1.2 | DHE-RSA-AES256-SHA256 | DHE | 1024 | yes | 80 | low | |
| TLSv1.2 | DHE-RSA-AES128-SHA256 | DHE | 1024 | yes | 80 | low | |
| TLSv1.2 | DHE-RSA-AES256-SHA | DHE | 1024 | yes | 80 | low | |
| TLSv1.2 | DHE-RSA-AES128-SHA | DHE | 1024 | yes | 80 | low | |
| TLSv1.2 | EDH-RSA-DES-CBC3-SHA | DHE | 1024 | yes | 80 |
All supported DevTest releases.
Vulnerability.
STEPS TO DISABLE WEAK/UNSAFE KEY LENGTH AND CIPHERS
Ciphers to add:
TLS_DHE_RSA_WITH_AES_256_CBC_
TLS_DHE_DSS_WITH_AES_256_CBC_
TLS_DHE_RSA_WITH_AES_256_CBC_
TLS_DHE_DSS_WITH_AES_256_CBC_
TLS_DHE_RSA_WITH_AES_128_CBC_
TLS_DHE_DSS_WITH_AES_128_CBC_
TLS_DHE_RSA_WITH_AES_128_CBC_
TLS_DHE_DSS_WITH_AES_128_CBC_
TLS_DHE_RSA_WITH_AES_256_GCM_
TLS_DHE_DSS_WITH_AES_256_GCM_
TLS_DHE_RSA_WITH_AES_128_GCM_
TLS_DHE_DSS_WITH_AES_128_GCM_
For example this line could look like:
jdk.tls.disabledAlgorithms=
DH keySize < 2048, EC keySize < 224, 3DES_EDE_CBC, anon, NULL, \\
include jdk.disabled.namedCurves,\\
TLS_DHE_RSA_WITH_AES_256_
TLS_DHE_DSS_WITH_AES_256_CBC_
TLS_DHE_RSA_WITH_AES_256_CBC_
TLS_DHE_DSS_WITH_AES_256_CBC_
TLS_DHE_RSA_WITH_AES_128_CBC_
TLS_DHE_DSS_WITH_AES_128_CBC_
TLS_DHE_RSA_WITH_AES_128_CBC_
TLS_DHE_DSS_WITH_AES_128_CBC_
TLS_DHE_RSA_WITH_AES_256_GCM_
TLS_DHE_DSS_WITH_AES_256_GCM_
TLS_DHE_RSA_WITH_AES_128_GCM_
TLS_DHE_DSS_WITH_AES_128_GCM_
Save the file and then restart all the DevTest Services.
This will resolve the weak ciphers.