Red Hat Bugzilla – Bug 1548093
smart_proxy_dynflow_core weak cipher
Last modified: 2018-05-21 16:17:14 EDT
FailedQA. @satellite-6.2.15-1.0.el7sat.noarch tfm-rubygem-smart_proxy_dynflow_core-0.1.3.1-1.el7sat.noarch # nmap --script +ssl-enum-ciphers localhost -p 8008 | grep -e weak -e TLSv -e SSLv | TLSv1.1: | TLS_RSA_WITH_IDEA_CBC_SHA - weak | TLSv1.2: | TLS_RSA_WITH_IDEA_CBC_SHA - weak |_ least strength: weak >>> weak ciphers are still used
VERIFIED. @satellite-6.2.15-1.0.el7sat.noarch tfm-rubygem-smart_proxy_dynflow_core-0.1.3.2-1.el7sat.noarch # nmap --script +ssl-enum-ciphers localhost -p 8008 ... PORT STATE SERVICE 8008/tcp open http | ssl-enum-ciphers: | TLSv1.1: | ciphers: | TLS_RSA_WITH_AES_128_CBC_SHA - strong | TLS_RSA_WITH_AES_256_CBC_SHA - strong | compressors: | NULL | TLSv1.2: | ciphers: | TLS_RSA_WITH_AES_128_CBC_SHA - strong | TLS_RSA_WITH_AES_128_CBC_SHA256 - strong | TLS_RSA_WITH_AES_128_GCM_SHA256 - strong | TLS_RSA_WITH_AES_256_CBC_SHA - strong | TLS_RSA_WITH_AES_256_CBC_SHA256 - strong | TLS_RSA_WITH_AES_256_GCM_SHA384 - strong | compressors: | NULL |_ least strength: strong >>> least strength cipher is strong
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2018:1672