Forum Discussion
Eric_Brander_27
Nimbostratus
Apr 08, 2008SSL Encryption Level
Thanks for clicking.
I've been notified via our auditors that our BIGIP LTM is allowing weak encryption. Yet I cannot for the life of me find where I can tell the LTM to only allow Medium or High encryption.
Would anyone mind feeding me a clue?
Thanks,
Eric
From the audit:
THREAT:
The Secure Socket Layer (SSL) protocol allows for secure communication between a client and a server.
SSL encryption ciphers are classified based on encryption key length as follows:
HIGH - key length larger than 128 bits
MEDIUM - key length equal to 128 bits
LOW - key length smaller than 128 bits
Messages encrypted with LOW encryption ciphers are easy to decrypt. Commercial SSL servers should only support MEDIUM or HIGH strength ciphers to guarantee transaction security.
Please note that this detection only checks for weak cipher support at the SSL layer. Some servers may implement additional protection at the data layer. For
example, some SSL servers and SSL proxies (such as SSL accelerators) allow cipher negotiation to complete but send back an error message and abort further
communication on the secure channel. This vulnerability may not be exploitable for such configurations.
IMPACT:
An attacker can exploit this vulnerability to decrypt secure communications without authorization.
SOLUTION:
Disable support for LOW encryption ciphers.
- hoolio
Cirrostratus
Hi Eric, - Eric_Brander_27
Nimbostratus
Thank you! Ciphers is the keyword I was missing. I searched for encryption level, ssl level, etc, etc but not the word cipher. - david_quint_204
Nimbostratus
I have had the same report from our PCI auditors. However, I have followed the askF5.com cipher strength recommendations to remove LOW level SSL encryption before our audit/scan was completed. Is there anything that can be done or is the PCI audit showing a false positive in some way? - Michael_Yates
Nimbostratus
This was the recommended ciphter that we found:when HTTP_REQUEST { if { [SSL::cipher bits] < 128 }{ log local0. "[IP::remote_addr] had cipher of [SSL::cipher bits]" }} }
- david_quint_204
Nimbostratus
Yes, I already have the same cipher string in place. I will try the iRule and see if it is a false positive or not. Thank you for the iRule, this will help tremendously. - hoolio
Cirrostratus
The Redirection on Weak Encryption Codeshare example handles this scenario more gracefully than disabling the low ciphers on the client SSL profile. The former gives you a chance to redirect the client to a page which explains why they're not able to access the application and a way to fix the problem. The latter should result in a TCP FIN or RST which the client would probably assume is a problem with the application.tmm --clientciphers 'DEFAULT:!ADH:!EXPORT40:!EXP:!LOW' ID SUITE BITS PROT METHOD CIPHER MAC KEYX 0: 4 RC4-MD5 128 SSL3 Native RC4 MD5 RSA 1: 4 RC4-MD5 128 TLS1 Native RC4 MD5 RSA 2: 5 RC4-SHA 128 SSL3 Native RC4 SHA RSA 3: 5 RC4-SHA 128 TLS1 Native RC4 SHA RSA 4: 47 AES128-SHA 128 SSL3 Native AES SHA RSA 5: 47 AES128-SHA 128 TLS1 Native AES SHA RSA 6: 47 AES128-SHA 128 DTLS1 Native AES SHA RSA 7: 53 AES256-SHA 256 SSL3 Native AES SHA RSA 8: 53 AES256-SHA 256 TLS1 Native AES SHA RSA 9: 53 AES256-SHA 256 DTLS1 Native AES SHA RSA 10: 10 DES-CBC3-SHA 192 SSL3 Native DES SHA RSA 11: 10 DES-CBC3-SHA 192 TLS1 Native DES SHA RSA 12: 10 DES-CBC3-SHA 192 DTLS1 Native DES SHA RSA
- hoolio
Cirrostratus
Yes, the cipher strings option for client and server SSL profiles should work in 9.3.x. See SOL7815 for details: - brad_11480
Nimbostratus
how do you change the encryption level for the web management to the appliance? seems that it is set to low and our security management people want it fixed! - What_Lies_Bene1
Cirrostratus
Modify the /var/run/config/httpd.conf.d/ssl.conf file, in particular the SSL Protocol and SSLCipherSuite values.
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects