This shows you the differences between two versions of the page.
| Next revision | Previous revision | ||
|
tsm:tsm_container_cloud [2021/01/01 21:25] 127.0.0.1 external edit |
tsm:tsm_container_cloud [2022/01/13 15:39] (current) manu [S3 algorithm] |
||
|---|---|---|---|
| Line 206: | Line 206: | ||
| Check which protocol and algorithm is used by S3 storage: | Check which protocol and algorithm is used by S3 storage: | ||
| - | <code> | + | <cli prompt='#'> |
| + | # nmap -p 443 -Pn 10.10.10.10 --script +ssl-enum-ciphers | ||
| + | Starting Nmap 6.40 ( http://nmap.org ) at 2022-01-13 14:41 CET | ||
| + | Nmap scan report for xxxxxxxxxxx (xxxxxxxxxx) | ||
| + | Host is up (0.00091s latency). | ||
| + | PORT STATE SERVICE | ||
| + | 443/tcp open xxxxxxxxxxx | ||
| + | | ssl-enum-ciphers: | ||
| + | | TLSv1.2: | ||
| + | | ciphers: | ||
| + | | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 - strong | ||
| + | | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 - strong | ||
| + | | TLS_RSA_WITH_AES_128_CBC_SHA256 - strong | ||
| + | | TLS_RSA_WITH_AES_128_GCM_SHA256 - strong | ||
| + | | TLS_RSA_WITH_AES_256_CBC_SHA256 - strong | ||
| + | | TLS_RSA_WITH_AES_256_GCM_SHA384 - strong | ||
| + | | compressors: | ||
| + | | NULL | ||
| + | |_ least strength: strong | ||
| + | |||
| + | Nmap done: 1 IP address (1 host up) scanned in 0.43 seconds | ||
| + | </cli> | ||
| + | Tt returns "TLS_RSA_WITH_AES_128_CBC_SHA256" from TLSv1.2 | ||
| + | Ciphers. this is the cipher was disabled in our v8.1.10, | ||
| + | v8.1.11 and v8.1.12.0 code. | ||
| + | |||
| + | |||
| + | <cli prompt='#'> | ||
| # for v in ssl2 ssl3 tls1 tls1_1 tls1_2; do | # for v in ssl2 ssl3 tls1 tls1_1 tls1_2; do | ||
| > for c in $(openssl ciphers 'ALL:eNULL' | tr ':' ' '); do | > for c in $(openssl ciphers 'ALL:eNULL' | tr ':' ' '); do | ||
| Line 220: | Line 247: | ||
| tls1_2: AES128-SHA256 | tls1_2: AES128-SHA256 | ||
| - | </code> | + | </cli> |