You had me at EHLO.

--
Espi



On Wed, Jul 17, 2013 at 8:26 AM, Ziots, Edward <[email protected]> wrote:

>  Chris, ****
>
> ** **
>
> I believe in the Client Hello Message and the associated Cipher Specs are
> passed between the client and the server and they agree on a mutual cipher
> specification they can support. ****
>
> ** **
>
> You can look at this using openssl or sslscan (if you have a unix system)*
> ***
>
> ** **
>
> Here is an example of what you will see on a unix system:****
>
> Testing SSL server google.com on port 443****
>
> ** **
>
>   Supported Server Cipher(s):****
>
>     Rejected  SSLv2  168 bits  DES-CBC3-MD5****
>
>     Rejected  SSLv2  56 bits   DES-CBC-MD5****
>
>     Rejected  SSLv2  40 bits   EXP-RC2-CBC-MD5****
>
>     Rejected  SSLv2  128 bits  RC2-CBC-MD5****
>
>     Rejected  SSLv2  40 bits   EXP-RC4-MD5****
>
>     Rejected  SSLv2  128 bits  RC4-MD5****
>
>     Rejected  SSLv3  256 bits  ADH-AES256-SHA****
>
>     Rejected  SSLv3  256 bits  DHE-RSA-AES256-SHA****
>
>     Rejected  SSLv3  256 bits  DHE-DSS-AES256-SHA****
>
>     Accepted  SSLv3  256 bits  AES256-SHA****
>
>     Rejected  SSLv3  128 bits  ADH-AES128-SHA****
>
>     Rejected  SSLv3  128 bits  DHE-RSA-AES128-SHA****
>
>     Rejected  SSLv3  128 bits  DHE-DSS-AES128-SHA****
>
>     Accepted  SSLv3  128 bits  AES128-SHA****
>
>     Rejected  SSLv3  168 bits  ADH-DES-CBC3-SHA****
>
>     Rejected  SSLv3  56 bits   ADH-DES-CBC-SHA****
>
>     Rejected  SSLv3  40 bits   EXP-ADH-DES-CBC-SHA****
>
>     Rejected  SSLv3  128 bits  ADH-RC4-MD5****
>
>     Rejected  SSLv3  40 bits   EXP-ADH-RC4-MD5****
>
>     Rejected  SSLv3  168 bits  EDH-RSA-DES-CBC3-SHA****
>
>     Rejected  SSLv3  56 bits   EDH-RSA-DES-CBC-SHA****
>
>     Rejected  SSLv3  40 bits   EXP-EDH-RSA-DES-CBC-SHA****
>
>     Rejected  SSLv3  168 bits  EDH-DSS-DES-CBC3-SHA****
>
>     Rejected  SSLv3  56 bits   EDH-DSS-DES-CBC-SHA****
>
>     Rejected  SSLv3  40 bits   EXP-EDH-DSS-DES-CBC-SHA****
>
>     Accepted  SSLv3  168 bits  DES-CBC3-SHA****
>
>     Rejected  SSLv3  56 bits   DES-CBC-SHA****
>
>     Rejected  SSLv3  40 bits   EXP-DES-CBC-SHA****
>
>     Rejected  SSLv3  40 bits   EXP-RC2-CBC-MD5****
>
>     Accepted  SSLv3  128 bits  RC4-SHA****
>
>     Accepted  SSLv3  128 bits  RC4-MD5****
>
>     Rejected  SSLv3  40 bits   EXP-RC4-MD5****
>
>     Rejected  SSLv3  0 bits    NULL-SHA****
>
>     Rejected  SSLv3  0 bits    NULL-MD5****
>
>     Rejected  TLSv1  256 bits  ADH-AES256-SHA****
>
>     Rejected  TLSv1  256 bits  DHE-RSA-AES256-SHA****
>
>     Rejected  TLSv1  256 bits  DHE-DSS-AES256-SHA****
>
>     Accepted  TLSv1  256 bits  AES256-SHA****
>
>     Rejected  TLSv1  128 bits  ADH-AES128-SHA****
>
>     Rejected  TLSv1  128 bits  DHE-RSA-AES128-SHA****
>
>     Rejected  TLSv1  128 bits  DHE-DSS-AES128-SHA****
>
>     Accepted  TLSv1  128 bits  AES128-SHA****
>
>     Rejected  TLSv1  168 bits  ADH-DES-CBC3-SHA****
>
>     Rejected  TLSv1  56 bits   ADH-DES-CBC-SHA****
>
>     Rejected  TLSv1  40 bits   EXP-ADH-DES-CBC-SHA****
>
>     Rejected  TLSv1  128 bits  ADH-RC4-MD5****
>
>     Rejected  TLSv1  40 bits   EXP-ADH-RC4-MD5****
>
>     Rejected  TLSv1  168 bits  EDH-RSA-DES-CBC3-SHA****
>
>     Rejected  TLSv1  56 bits   EDH-RSA-DES-CBC-SHA****
>
>     Rejected  TLSv1  40 bits   EXP-EDH-RSA-DES-CBC-SHA****
>
>     Rejected  TLSv1  168 bits  EDH-DSS-DES-CBC3-SHA****
>
>     Rejected  TLSv1  56 bits   EDH-DSS-DES-CBC-SHA****
>
>     Rejected  TLSv1  40 bits   EXP-EDH-DSS-DES-CBC-SHA****
>
>     Accepted  TLSv1  168 bits  DES-CBC3-SHA****
>
>     Rejected  TLSv1  56 bits   DES-CBC-SHA****
>
>     Rejected  TLSv1  40 bits   EXP-DES-CBC-SHA****
>
>     Rejected  TLSv1  40 bits   EXP-RC2-CBC-MD5****
>
>     Accepted  TLSv1  128 bits  RC4-SHA****
>
>     Accepted  TLSv1  128 bits  RC4-MD5****
>
>     Rejected  TLSv1  40 bits   EXP-RC4-MD5****
>
>     Rejected  TLSv1  0 bits    NULL-SHA****
>
>     Rejected  TLSv1  0 bits    NULL-MD5****
>
> ** **
>
>   Prefered Server Cipher(s):****
>
>     *SSLv3  128 bits  RC4-SHA*
>
>     *TLSv1  128 bits  RC4-SHA*
>
> * *
>
> *And here is the certificate information*
>
> *SSL Certificate:*
>
> *    Version: 2*
>
> *    Serial Number: -4294967295*
>
> *    Signature Algorithm: sha1WithRSAEncryption*
>
> *    Issuer: /C=US/O=Google Inc/CN=Google Internet Authority*
>
> *    Not valid before: Jul 12 09:00:30 2013 GMT*
>
> *    Not valid after: Oct 31 23:59:59 2013 GMT*
>
> *    Subject: /C=US/ST=California/L=Mountain View/O=Google Inc/CN=*.
> google.com*
>
> *    Public Key Algorithm: rsaEncryption*
>
> *    RSA Public Key: (1024 bit)*
>
> *      Modulus (1024 bit):*
>
> *          00:d4:64:e4:a0:d1:99:77:13:76:8a:ea:90:11:6a:*
>
> *          ec:cc:f5:ec:f5:d8:dc:bd:57:6b:2a:40:03:f8:0c:*
>
> *          8e:ee:d3:71:2e:9c:6c:c9:8e:12:19:88:5d:7e:54:*
>
> *          97:e1:80:c5:f2:f0:98:4d:96:48:67:b5:2b:9f:26:*
>
> *          fb:e0:78:0f:5e:77:10:a2:17:73:e8:a5:ac:32:ad:*
>
> *          ec:af:c1:7d:c5:f5:70:7d:ea:52:19:3a:65:cd:c8:*
>
> *          3b:63:d3:3c:bd:d4:62:45:80:e9:68:87:d4:48:6e:*
>
> *          69:fd:fd:f3:d1:5f:07:b5:64:db:43:6f:d9:03:af:*
>
> *          34:e1:d6:d7:ca:99:5a:06:f3*
>
> *      Exponent: 65537 (0x10001)*
>
> *    X509v3 Extensions:*
>
> *      X509v3 Extended Key Usage:*
>
> *        TLS Web Server Authentication, TLS Web Client Authentication*
>
> *      X509v3 Subject Key Identifier:*
>
> *        0A:CF:FB:B2:52:23:8F:BE:DA:A4:3A:C6:63:66:AF:20:01:6C:5F:33*
>
> *      X509v3 Authority Key Identifier:*
>
> *        keyid:BF:C0:30:EB:F5:43:11:3E:67:BA:9E:91:FB:FC:6A:DA:E3:6B:12:24
> *
>
> * *
>
> *      X509v3 CRL Distribution Points:*
>
> *        URI:
> http://www.gstatic.com/GoogleInternetAuthority/GoogleInternetAuthority.crl
> *
>
> ** **
>
> Edward E. Ziots, CISSP, CISA, Security +, Network +****
>
> Security Engineer****
>
> Lifespan Organization****
>
> [email protected]****
>
> Work:401-255-2497****
>
> ** **
>
> ** **
>
> This electronic message and any attachments may be privileged and
> confidential and protected from disclosure. If you are reading this
> message, but are not the intended recipient, nor an employee or agent
> responsible for delivering this message to the intended recipient, you are
> hereby notified that you are strictly prohibited from copying, printing,
> forwarding or otherwise disseminating this communication. If you have
> received this communication in error, please immediately notify the sender
> by replying to the message. Then, delete the message from your computer.
> Thank you.****
>
> *[image: Description: Description: Lifespan]*
>
> ** **
>
> ** **
>
> *From:* [email protected] [mailto:
> [email protected]] *On Behalf Of *Christopher Bodnar
> *Sent:* Wednesday, July 17, 2013 11:04 AM
> *To:* [email protected]
> *Subject:* [NTSysADM] SSL/TLS question****
>
> ** **
>
> I'd really appreciate any help clarifying this topic for  me.
>
> I know I should know this stuff, but I've never really had to deal with it
> much before besides installing a certificate on an IIS server. I've always
> seen them lumped together as SSL/TLS.
>
> OK.... so basically TLS is the next version of SSL (
> https://en.wikipedia.org/wiki/Transport_Layer_Security). That I get. What
> I was trying to find out is how you know what version is being used, and
> what dictates that. I initially thought that was the certificate. That does
> not seem to be the case. It seems that it's a negotiation based on what is
> configured on the client and the server, based on the application being
> used (Web, Mail, FTP, etc....). So for example on a generic web site using
> IE as the client and IIS as the web server with a certificate installed....
> the client and server negotiate the SSL/TLS version based on the browsers
> configuration and the registry keys on the server
> (HKey_Local_Machine\System\CurrentControlSet\Control\SecurityProviders
> \SCHANNEL\Protocols)?
>
> Is that right at a high level?
>
> Thanks
>
> ****
>
> *Christopher Bodnar*
> Enterprise Architect I, Corporate Office of Technology:Enterprise
> Architecture and Engineering Services ****
>
> Tel 610-807-6459
> 3900 Burgess Place, Bethlehem, PA 18017
> [email protected] ****
>
>
> *
> The Guardian Life Insurance Company of America*
> *
> *www.guardianlife.com ****
>
>
> ----------------------------------------- This message, and any
> attachments to it, may contain information that is privileged,
> confidential, and exempt from disclosure under applicable law. If the
> reader of this message is not the intended recipient, you are notified that
> any use, dissemination, distribution, copying, or communication of this
> message is strictly prohibited. If you have received this message in error,
> please notify the sender immediately by return e-mail and delete the
> message and any attachments. Thank you. ****
>

<<image002.jpg>>

<<image001.jpg>>

Reply via email to