SSL/TLS:报告易受攻击的密码套件(CVE-2016-2183)(原理扫描)
被扫出这个漏洞需要怎么处理呀
(0)
最佳答案
漏洞规避措施:
[H3C]ssl server-policy fxm
[H3C-ssl-server-policy-fxm]ci
[H3C-ssl-server-policy-fxm]ciphersuite ? //选个非EDS,3EDS的算法
dhe_rsa_aes_128_cbc_sha Cipher suite that uses DHE RSA, 128-bit AES_CBC, and
SHA
dhe_rsa_aes_256_cbc_sha Cipher suite that uses DHE RSA, 256-bit AES_CBC, and
SHA
exp_rsa_des_cbc_sha Export cipher suite that uses RSA, DES_CBC, and SHA
exp_rsa_rc2_md5 Export cipher suite that uses RSA, RC2, and MD5
exp_rsa_rc4_md5 Export cipher suite that uses RSA, RC4, and MD5
rsa_3des_ede_cbc_sha Cipher suite that uses RSA, 3DES_EDE_CBC, and SHA
rsa_aes_128_cbc_sha Cipher suite that uses RSA, 128-bit AES_CBC, and SHA
rsa_aes_256_cbc_sha Cipher suite that uses RSA, 256-bit AES_CBC, and SHA
rsa_des_cbc_sha Cipher suite that uses RSA, DES_CBC, and SHA
rsa_rc4_128_md5 Cipher suite that uses RSA, 128-bit RC4, and MD5
rsa_rc4_128_sha Cipher suite that uses RSA, 128-bit RC4, and SHA
重启https服务。
undo ip https enable
ip https enable
(0)
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论