This article describes the steps to disable any weak ciphers in vSphere Replication and Site Recovery Manager 8.4 or higher.
The security tool found vSphere Replication and Site Recovery Manager 8.4 or higher utilized weak ciphers.
VMware Site Recovery Manager 8.4 and higher/newer.
VMware vSphere Replication 8.4 and higher/newer.
VMware Live Site Recovery 9.x
VMware vSphere Replication 9.x
Currently, there is no resolution.
To workaround this issue, follow the steps below:
/opt/vmware/envoy/conf/envoy-proxy.yaml. Find following entry and remove unwanted ciphers:cipher_suites: "ECDHE+AESGCM:RSA+AESGCM:ECDHE+AES:RSA+AES"systemctl restart envoy-proxy.service"Note: Envoy proxy cipher suites are separated with colon.
Steps to validate the supported Cipher version.
Please use the below command to get the supported ciphers on the SRM/VR.
nmap --script ssl-enum-ciphers -p [port] [destination_name]
Example: If you want to scan SRM on IP ###.*##.##.01, listening on port 443, the command to run would be nmap --script ssl-enum-ciphers -p 443 ###.*##.##.01