This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision | |||
|
tsm:tsm_container_cloud [2022/01/13 14:40] manu |
tsm:tsm_container_cloud [2022/01/13 15:39] (current) manu [S3 algorithm] |
||
|---|---|---|---|
| Line 207: | Line 207: | ||
| Check which protocol and algorithm is used by S3 storage: | Check which protocol and algorithm is used by S3 storage: | ||
| <cli prompt='#'> | <cli prompt='#'> | ||
| - | # nmap --script ssl-enum-ciphers -p 443 xxxx.xxxx.xxx | + | # nmap -p 443 -Pn 10.10.10.10 --script +ssl-enum-ciphers |
| - | + | Starting Nmap 6.40 ( http://nmap.org ) at 2022-01-13 14:41 CET | |
| - | The command return: | + | Nmap scan report for xxxxxxxxxxx (xxxxxxxxxx) |
| - | ... | + | Host is up (0.00091s latency). |
| - | PORT STATE SERVICE | + | PORT STATE SERVICE |
| - | 443/tcp open https | + | 443/tcp open xxxxxxxxxxx |
| | ssl-enum-ciphers: | | ssl-enum-ciphers: | ||
| - | | SSLv3: No supported ciphers found | + | | TLSv1.2: |
| - | | TLSv1.2: | + | | ciphers: |
| - | | ciphers: | + | | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 - strong |
| - | | TLS_RSA_WITH_AES_128_CBC_SHA256 - strong | + | | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 - strong |
| + | | TLS_RSA_WITH_AES_128_CBC_SHA256 - strong | ||
| + | | TLS_RSA_WITH_AES_128_GCM_SHA256 - strong | ||
| + | | TLS_RSA_WITH_AES_256_CBC_SHA256 - strong | ||
| + | | TLS_RSA_WITH_AES_256_GCM_SHA384 - strong | ||
| + | | compressors: | ||
| + | | NULL | ||
| + | |_ least strength: strong | ||
| - | .... | + | Nmap done: 1 IP address (1 host up) scanned in 0.43 seconds |
| </cli> | </cli> | ||
| Tt returns "TLS_RSA_WITH_AES_128_CBC_SHA256" from TLSv1.2 | Tt returns "TLS_RSA_WITH_AES_128_CBC_SHA256" from TLSv1.2 | ||