2013년 7월 8일 월요일

[TechNote] Security scan incorrectly reports that the IBM HTTP Server supports weak ciphers

Security scan incorrectly reports that the IBM HTTP Server supports weak ciphers


Technote (troubleshooting)


Problem(Abstract)

Security scan incorrectly reports that the IBM HTTP Server supports weak ciphers even after the httpd.conf file had been configured to disable weak ciphers.

Symptom

Your security scanner software reports the following vulnerability with IBM HTTP Server SSL ciphers:
Synopsis : The remote service supports the use of weak SSL ciphers.
Description : The remote host supports the use of SSL ciphers that
offer either weak encryption or no encryption at all. See also :
http://www.openssl.org/docs/apps/ciphers.html
http://www.openssl.org/docs/apps/ciphers.html
Solution: Reconfigure the affected application if possible to avoid use of weak ciphers.
Risk Factor: Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Plugin output : Here is the list of weak SSL ciphers supported by the remote server :
Low Strength Ciphers (< 56-bit key) SSLv3 EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA
Enc=DES(40) Mac=SHA1 export EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA
Enc=DES(40) Mac=SHA1 export EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA
Enc=RC2(40) Mac=MD5 export EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40)
Mac=MD5 export The fields above are : {OpenSSL ciphername} Kx={key
exchange} Au={authentication} Enc={symmetric encryption method}
Mac={message authentication code} {export flag} [More]

The httpd.conf file is configured correctly with the strong ciphers and weak SSLv2 ciphers are disabled:

<VirtualHost *:443>
SSLEnable
## Disable SSLv2
SSLProtocolDisable SSLv2
## Set strong ciphers
SSLCipherSpec 3A
SSLCipherSpec 34
SSLCipherSpec 35

The HTTP Error.log file actually shows that only strong ciphers are being used:

SSL0320I: Using Version 3 Cipher: SSL_RSA_WITH_3DES_EDE_CBC_SHA(3A)
SSL0320I: Using Version 3 Cipher: SSL_RSA_WITH_RC4_128_MD5(34)
SSL0320I: Using Version 3 Cipher: SSL_RSA_WITH_RC4_128_SHA(35)


Cause

The security scanner tool was accessing data from the firewall.

Resolving the problem

Your GSKit trace shows many successful handshakes which were all for the 3DES ciphers (SSL_RSA_WITH_3DES_EDE_CBC_SHA(3A)).

The connection requests from the scan test tool does not access the IBM HTTP Server directly. It is possible that the scanner software accesses a front-end server in the network with a firewall, load balancer, proxy server, and so on, which is willing to accept weak ciphers and then connect to IBM HTTP Server using 3DES.

After you ran the test tool locally on the IBM HTTP Server, without any intervening servers, it was determined that the report was getting data from the firewall. After the firewall was corrected, the problem was resolved.

댓글 없음:

댓글 쓰기