The security tool found vSphere Replication 8.8 or higher utilized weak ciphers.
Weak ciphers are defined as:
To address this, you need to disallow deprecated or disallowed ciphers.
Determine Current Ciphers
Use the nmap
command to list the current ciphers supported by vSphere Replication on port 8123:
nmap -sV --script ssl-enum-ciphers -p 8123 127.0.0.1
Example output:
Identify weak ciphers from the output that are generating alerts, such as:
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_GCM_SHA384
Update Cipher Configuration
To disable weak ciphers on port 8123, follow these steps:
Snapshot: Take a snapshot of the vSphere Replication appliance.
Access: Log in to the vSphere Replication Appliance and vSphere Replication Server using PuTTY.
Edit Configuration:
Open the file /etc/vmware/hbrsrv.xml
in an editor.
Locate the <vmacore>
tag and add the following lines to disable the identified weak ciphers:
<ssl>
<cipherList>!aNULL:!AES256-SHA256:!RSA+AESGCM:ECDHE+AES:AES</cipherList>
</ssl>
Save the file.
Restart the service:
systemctl stop hbrsrv
systemctl start hbrsrv
Explanation of Cipher List:
!aNULL
: Excludes ciphers without authentication.!AES256-SHA256
: Excludes the AES256-SHA256 cipher suite.!RSA+AESGCM
: Excludes RSA key exchange with AES in Galois/Counter Mode (GCM).ECDHE+AES
: Includes ciphers with Elliptic Curve Diffie-Hellman Ephemeral (ECDHE) key exchange and AES encryption.AES
: Includes all ciphers using AES encryption.