This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
tsm:tsm_container_cloud [2021/01/01 21:25] 127.0.0.1 external edit |
tsm:tsm_container_cloud [2022/01/13 15:39] (current) manu [S3 algorithm] |
||
---|---|---|---|
Line 206: | Line 206: | ||
Check which protocol and algorithm is used by S3 storage: | Check which protocol and algorithm is used by S3 storage: | ||
- | <code> | + | <cli prompt='#'> |
+ | # nmap -p 443 -Pn 10.10.10.10 --script +ssl-enum-ciphers | ||
+ | Starting Nmap 6.40 ( http://nmap.org ) at 2022-01-13 14:41 CET | ||
+ | Nmap scan report for xxxxxxxxxxx (xxxxxxxxxx) | ||
+ | Host is up (0.00091s latency). | ||
+ | PORT STATE SERVICE | ||
+ | 443/tcp open xxxxxxxxxxx | ||
+ | | ssl-enum-ciphers: | ||
+ | | TLSv1.2: | ||
+ | | ciphers: | ||
+ | | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 - strong | ||
+ | | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 - strong | ||
+ | | TLS_RSA_WITH_AES_128_CBC_SHA256 - strong | ||
+ | | TLS_RSA_WITH_AES_128_GCM_SHA256 - strong | ||
+ | | TLS_RSA_WITH_AES_256_CBC_SHA256 - strong | ||
+ | | TLS_RSA_WITH_AES_256_GCM_SHA384 - strong | ||
+ | | compressors: | ||
+ | | NULL | ||
+ | |_ least strength: strong | ||
+ | |||
+ | Nmap done: 1 IP address (1 host up) scanned in 0.43 seconds | ||
+ | </cli> | ||
+ | Tt returns "TLS_RSA_WITH_AES_128_CBC_SHA256" from TLSv1.2 | ||
+ | Ciphers. this is the cipher was disabled in our v8.1.10, | ||
+ | v8.1.11 and v8.1.12.0 code. | ||
+ | |||
+ | |||
+ | <cli prompt='#'> | ||
# for v in ssl2 ssl3 tls1 tls1_1 tls1_2; do | # for v in ssl2 ssl3 tls1 tls1_1 tls1_2; do | ||
> for c in $(openssl ciphers 'ALL:eNULL' | tr ':' ' '); do | > for c in $(openssl ciphers 'ALL:eNULL' | tr ':' ' '); do | ||
Line 220: | Line 247: | ||
tls1_2: AES128-SHA256 | tls1_2: AES128-SHA256 | ||
- | </code> | + | </cli> |