Am 03.01.2017 um 08:49 schrieb Christian Fischer:
On 02.01.2017 23:13, Reindl Harald wrote:
damned how long takes it to remove this bullshit

ENFORCING ANY BETTER SECURITY IN CASE OF OPPORTUNISTIC ENCRYPTION LEDAS
IN DELIVERING CLIENT FALL BACK TO ***NO ENVRYPTION** AT ALL

25/tcp

Weak ciphers offered by this service:
  TLS1_0_ECDH_anon_WITH_3DES_EDE_CBC_SHA
  TLS1_0_RSA_WITH_3DES_EDE_CBC_SHA
  TLS1_1_ECDH_anon_WITH_3DES_EDE_CBC_SHA
  TLS1_1_RSA_WITH_3DES_EDE_CBC_SHA
  TLS1_2_ECDH_anon_WITH_3DES_EDE_CBC_SHA
  TLS1_2_RSA_WITH_3DES_EDE_CBC_SHA

just use a current feed instead of CAPS writing and then you already got
this removed

the scan is from yesterday, the issues are months old (includinmg the openssh windows bruteforce nonsense on linux machines with key-only-auth on recent Fedora steups)

30 1 1 * * root /usr/local/bin/openvas-sync

[root@openvas:~]$ cat /usr/local/bin/openvas-sync
#!/usr/bin/dash
openvas-nvt-sync
openvas-scapdata-sync
openvas-certdata-sync
openvasmd --rebuild
killall -s SIGHUP openvassd

_______________________________________________
Openvas-discuss mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to