Good day,
I have a IBM WAS liberty server, which is place under OS redhat linux
, with openjdk
version 1.8.0_242.
I receive a pentest
report that complain about this server is using medium strength ciphers. And the pentest
report also recommend me to use TLS 1.2
with AES-GCM
suites or higher instead.
Currently my server only enable TLSv1.2.
First thing I would like to ask is how can I disable/remove the medium strength ciphers in my server?
Second thing is, I would like to know how can I check whether this server is using medium strength ciphers. So that I can know anything I changes have disable/remove the medium strength ciphers or not.
I have try openssl
command as follow:
openssl s_client -connect 10.7.5.65:9443 -tls1_2
The result I get is as follow:
Peer signing digest: SHA512
Server Temp Key: DH, 1024 bits
---
SSL handshake has read 1710 bytes and written 479 bytes
---
New, TLSv1/SSLv3, Cipher is DHE-RSA-AES128-GCM-SHA256
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : DHE-RSA-AES128-GCM-SHA256
I saw the DHE-RSA-AES128-GCM-SHA256
in the result, but is this to show that my server is using medium strength cipher?
Another way is the way I refer to this post How do I list the SSL/TLS cipher suites a particular website offers? , I run the script, its showing my cipher 1 by 1 and tell me whether it have ssl handshake failure or not, possible to know whether this server having medium strength cipher from here?
I have try something also, 1 of it is I edit the jvm java.security, to remove the 3DES_EDE_CBC
in jdk.tls.legacyAlgorithms
, I restart server, but also same result for the openssl s_client -connect 10.7.5.65:9443 -tls1_2
command, thus I am not sure whether it fix the thing or not.
Kindly help and advise.