This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
tsm:tsm_container_cloud [2022/01/13 14:38] manu |
tsm:tsm_container_cloud [2022/01/13 15:39] (current) manu [S3 algorithm] |
||
---|---|---|---|
Line 206: | Line 206: | ||
Check which protocol and algorithm is used by S3 storage: | Check which protocol and algorithm is used by S3 storage: | ||
- | <cli prompt='>'> | + | <cli prompt='#'> |
- | # nmap --script ssl-enum-ciphers -p 443 xxxx.xxxx.xxx | + | # nmap -p 443 -Pn 10.10.10.10 --script +ssl-enum-ciphers |
- | + | Starting Nmap 6.40 ( http://nmap.org ) at 2022-01-13 14:41 CET | |
- | The command return: | + | Nmap scan report for xxxxxxxxxxx (xxxxxxxxxx) |
- | ... | + | Host is up (0.00091s latency). |
- | PORT STATE SERVICE | + | PORT STATE SERVICE |
- | 443/tcp open https | + | 443/tcp open xxxxxxxxxxx |
| ssl-enum-ciphers: | | ssl-enum-ciphers: | ||
- | | SSLv3: No supported ciphers found | + | | TLSv1.2: |
- | | TLSv1.2: | + | | ciphers: |
- | | ciphers: | + | | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 - strong |
- | | TLS_RSA_WITH_AES_128_CBC_SHA256 - strong | + | | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 - strong |
+ | | TLS_RSA_WITH_AES_128_CBC_SHA256 - strong | ||
+ | | TLS_RSA_WITH_AES_128_GCM_SHA256 - strong | ||
+ | | TLS_RSA_WITH_AES_256_CBC_SHA256 - strong | ||
+ | | TLS_RSA_WITH_AES_256_GCM_SHA384 - strong | ||
+ | | compressors: | ||
+ | | NULL | ||
+ | |_ least strength: strong | ||
- | .... | + | Nmap done: 1 IP address (1 host up) scanned in 0.43 seconds |
</cli> | </cli> | ||
Tt returns "TLS_RSA_WITH_AES_128_CBC_SHA256" from TLSv1.2 | Tt returns "TLS_RSA_WITH_AES_128_CBC_SHA256" from TLSv1.2 |