On Thu, Jan 23, 2003 at 07:10:26PM -0700, Steve Chadsey wrote:
> How can I verify the ciphers enabled by my webserver?
>
> The reason I ask is because I have been informed by a third-party
> security auditor that my server "allows anonymous authentication",
> "allows cleartext communication", and "supports weak encryption".
> I am unable to verify any of these claims on my own.
>
> Here is my information
> Apache: 1.3.27
> mod_ssl: mod_ssl/2.8.12-1.3.27
> openssl: openssl-0.9.6g
> OS: Solaris 8
>
> Here are my relevant SSL directives from httpd.conf:
> SSLEngine on
> SSLCipherSuite HIGH:MEDIUM:!ADH
> SSLProtocol all -SSLv2
>
> According to
> /usr/local/ssl/bin/openssl ciphers -v 'HIGH:MEDIUM:!ADH'
> the supported ciphers for my server are:
> EDH-RSA-DES-CBC3-SHA SSLv3 Kx=DH Au=RSA Enc=3DES(168) Mac=SHA1
> EDH-DSS-DES-CBC3-SHA SSLv3 Kx=DH Au=DSS Enc=3DES(168) Mac=SHA1
> DES-CBC3-SHA SSLv3 Kx=RSA Au=RSA Enc=3DES(168) Mac=SHA1
> DES-CBC3-MD5 SSLv2 Kx=RSA Au=RSA Enc=3DES(168) Mac=MD5
> DHE-DSS-RC4-SHA SSLv3 Kx=DH Au=DSS Enc=RC4(128) Mac=SHA1
> IDEA-CBC-SHA SSLv3 Kx=RSA Au=RSA Enc=IDEA(128) Mac=SHA1
> RC4-SHA SSLv3 Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1
> RC4-MD5 SSLv3 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
> IDEA-CBC-MD5 SSLv2 Kx=RSA Au=RSA Enc=IDEA(128) Mac=MD5
> RC2-CBC-MD5 SSLv2 Kx=RSA Au=RSA Enc=RC2(128) Mac=MD5
> RC4-MD5 SSLv2 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
>
> But apparently I am also supporting:
> ADH-DES-CBC-SHA
> DES-CBC-SHA
> EDH-DSS-DES-CBC-SHA
> EDH-RSA-DES-CBC-SHA
> EXP1024-DES-CBC-SHA
> EXP1024-DHE-DSS-DES-CBC-SHA
> EXP1024-DHE-DSS-RC4-SHA
> EXP1024-RC2-CBC-MD5
> EXP1024-RC4-MD5
> EXP1024-RC4-SHA
> EXP-ADH-DES-CBC-SHA
> EXP-ADH-RC4-MD5
> EXP-DES-CBC-SHA
> EXP-EDH-DSS-DES-CBC-SHA
> EXP-EDH-RSA-DES-CBC-SHA
> EXP-RC2-CBC-MD5
> EXP-RC4-MD5
> NULL-MD5
> NULL-SHA
>
> Is the security auditor full of it? How can I verify their results
> from an external machine (they've scanned the network from an
> external box)?
Try to connect using
openssl s_client -connect hostname:443 -cipher ADH-DES-CBC-SHA
to see, if it really succeeds. With respect to your seetings it
better should not.
Unfortunately the server-info handler does not list the enabled ciphers
for crosschecking. The SSLv3/TLSv1 specification says that the client
has to list its supported ciphers, so from the protocol side of view
the only option indeed is to test connections with the ciphers in
question.
Best regards,
Lutz
--
Lutz Jaenicke [EMAIL PROTECTED]
http://www.aet.TU-Cottbus.DE/personen/jaenicke/
BTU Cottbus, Allgemeine Elektrotechnik
Universitaetsplatz 3-4, D-03044 Cottbus
______________________________________________________________________
Apache Interface to OpenSSL (mod_ssl) www.modssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]