TLS 1.0 enabled 漏洞

lighttpd服務使用Acunetix漏掃

TLS 1.0 enabled
Severity Medium
Reported by module /Scripts/PerServer/SSL_Audit.script
Description
The web server supports encryption through TLS 1.0. TLS 1.0 is not considered to be "strong cryptography" as defined and
required by the PCI Data Security Standard 3.2(.1) when used to protect sensitive information transferred to or from web
sites. According to PCI, "30 June 2018 is the deadline for disabling SSL/early TLS and implementing a more secure
encryption protocol – TLS 1.1 or higher (TLS v1.2 is strongly encouraged) in order to meet the PCI Data Security Standard
(PCI DSS) for safeguarding payment data.
Impact
An attacker may be able to exploit this problem to conduct man-in-the-middle attacks and decrypt communications between
the affected service and clients.
Recommendation
It is recommended to disable TLS 1.0 and replace it with TLS 1.2 or higher.
References
Are You Ready for 30 June 2018? Saying Goodbye to SSL/early TLS (https://blog.pcisecuritystandards.org/are-you-readyfor-
30-june-2018-sayin-goodbye-to-ssl-early-tls)
PCI 3.1 and TLS 1.2 (Cloudflare Support) (https://support.cloudflare.com/hc/en-us/articles/205043158-PCI-3-1-and-TLS-1-
2)
Affected items
Web Server
Details
The SSL server (port: 8443) encrypts traffic using TLSv1.0.
Request headers

解決方法

在lighttpd配置文件中添加
ssl.cipher-list = "TLSv1.2"
ssl.use-sslv2 = "disable"
ssl.use-sslv3 = "disable"
主要是第一個。

發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章