NRPE communication via weak ciphers audit findings
Posted: Thu Oct 16, 2014 3:39 am
Nagios 2014R1.2
RHEL 6.5 64bit
NRPE Agent V2.15
Client OS Solaris 10
We have a few audit findings relating to weak cipher communication via port 5666
SSL Weak Cipher Suites Supported
SSL Medium Strength Cipher Suites Supported
SSL RC4 Cipher Suites Supported
My question
1) Is this due to the nrpe agent compiled to support weak ciphers or the client host?
2) Is this due to Nagios itself communicating using weak ciphers?
"[Applies to both affected IPs and Port]
Here is the list of weak SSL ciphers supported by the remote server :
Low Strength Ciphers (< 56-bit key)
TLSv1
EXP-ADH-DES-CBC-SHA Kx=DH(512) Au=None Enc=DES-CBC(40) Mac=SHA1 export
EXP-ADH-RC4-MD5 Kx=DH(512) Au=None Enc=RC4(40) Mac=MD5 export
The fields above are :
{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}"
Thanks
RHEL 6.5 64bit
NRPE Agent V2.15
Client OS Solaris 10
We have a few audit findings relating to weak cipher communication via port 5666
SSL Weak Cipher Suites Supported
SSL Medium Strength Cipher Suites Supported
SSL RC4 Cipher Suites Supported
My question
1) Is this due to the nrpe agent compiled to support weak ciphers or the client host?
2) Is this due to Nagios itself communicating using weak ciphers?
"[Applies to both affected IPs and Port]
Here is the list of weak SSL ciphers supported by the remote server :
Low Strength Ciphers (< 56-bit key)
TLSv1
EXP-ADH-DES-CBC-SHA Kx=DH(512) Au=None Enc=DES-CBC(40) Mac=SHA1 export
EXP-ADH-RC4-MD5 Kx=DH(512) Au=None Enc=RC4(40) Mac=MD5 export
The fields above are :
{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}"
Thanks