I recently scanned my system for PCI compliance test using NMAP. NMAP reported following weak ciphers-
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C
TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C
These all are reported on TLSv1.2 on Port 5061. Port 5061 runs my secure SIP connection.
To resolve this, I disabled 3DES (Triple DES 168) from registry, also disabled, RC4 & MD5 ciphers completely from registry.
I also did set an SSL cipher Suite order which does not use DES/3DES/RC4 or MD5 but still, after each scan same vulnerabilities are being reported.
How can I resolve this & completely disable these ciphers? Also, is there anyway to block cipher suite negotiation on any particular port?
Thanks.
P.S.- This is a Windows Server 2012 machine.