Forum Discussion
How to disable CIPHER for and Disable TCP time stamp on F5 ?
Security through obscurity...
Anyway it looks like they added the option to disable this. In version 11.4.0 and up they seperated window scaling from timestamp for the high performance options in the TCP Profile.
See http://support.f5.com/kb/en-us/solutions/public/7000/500/sol7559.html
Still not recomended to disable, but if you cannot accept the risk with PCI at least you have the option. Is this coming up in a formal audit, or just a security scan? I don't think PCI strictly states this option must be off, and thus it is open to each auditor/penetration test to decide. I'd push back on them, and use sol8072 above as suporting evidence.
- mimlo_61970Sep 04, 2014
Cumulonimbus
Also, find out what ciphers they are considering weak. RC4 with TLS1.1 and above seems to be highly out of favor, but the last time I asked support about it they could not disable RC4 for just TLS1.1 and above, you had to disable it completely. You can go to ssllabs.com and put in your website and get their assessment of it with some recomendations.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com