Service Virtualization

 View Only

Expand all | Collapse all

How to validate which cipher suites are being used in TLS?

  • 1.  How to validate which cipher suites are being used in TLS?

    Posted Mar 01, 2023 12:01 PM

    Hi Folks,

    I am trying to restrict for tls to use only bank supported algorithms by updating below property in local.proeprties 

    lisa.server.https.cipher.suites=TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,\
    TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,\
    TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,\
    TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,\
    TLS_DHE_RSA_WITH_AES_256_GCM_SHA384,\
    TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,\

    How can i test the coorect one's are beign sued after the change ?

    Also do i need to make any other changes except this . We are using open JDk supplied by devtest 



  • 2.  RE: How to validate which cipher suites are being used in TLS?

    Broadcom Employee
    Posted Mar 01, 2023 12:03 PM

    What version of DevTest are you running?




  • 3.  RE: How to validate which cipher suites are being used in TLS?

    Posted Mar 01, 2023 12:30 PM

    Devtest 10.7.2

    Windows server




  • 4.  RE: How to validate which cipher suites are being used in TLS?
    Best Answer

    Broadcom Employee
    Posted Mar 01, 2023 01:50 PM

    Try this:

    Find the cipher using Chrome
    1. Launch Chrome.
    2. Enter the URL you wish to check in the browser.
    3. Click on the ellipsis located on the top-right in the browser.
    4. Select More tools > Developer tools > Security.
    5. Look for the line "Connection...". This will describe the version of TLS or SSL used.



  • 5.  RE: How to validate which cipher suites are being used in TLS?

    Broadcom Employee
    Posted Mar 01, 2023 01:53 PM

    You can also refer to this link:

    https://helpcenter.gsx.com/hc/en-us/articles/207831828-How-to-identify-the-Cipher-used-by-an-HTTPS-Connection




  • 6.  RE: How to validate which cipher suites are being used in TLS?

    Posted Mar 01, 2023 02:36 PM

    Thanks Marcy ! that works.

    Do i need to have any other change as well in javasecurity file orsomewhere else because RSA key size should not be less than 2048 

    We have done chnages at OS level but still keysize is 1024




  • 7.  RE: How to validate which cipher suites are being used in TLS?

    Broadcom Employee
    Posted Mar 01, 2023 05:18 PM
    Edited by Marcy Nunns Mar 01, 2023 05:44 PM

    Refer to this KB article: Service Virtualization: Weak key size for TLSv1.2




  • 8.  RE: How to validate which cipher suites are being used in TLS?

    Broadcom Employee
    Posted Mar 01, 2023 05:46 PM

    Refer to this KB article: https://knowledge.broadcom.com/external/article?articleId=251607 




  • 9.  RE: How to validate which cipher suites are being used in TLS?

    Posted Mar 02, 2023 12:33 PM

    Thanks marcy for sharing this .

    Qualys Scan do the following and reports vulenrability 

    QID Detection Logic:
     
    For a SSL enabled port, the scanner probes and maintains a list of supported SSL/TLS versions. For each supported version, the scanner does a SSL handshake to get a list of KEX methods supported by the server. It reports all KEX methods that are considered weak and List all server supported ciphers for each weak key exchange method supported by Server.  
    The criteria of a weak KEX method is as follows: 
    The SSL/TLS server supports key exchanges that are cryptographically weaker than recommended. Key exchanges should provide at least 112 bits of security, which translates to a minimum key size of 2048 bits for Diffie Hellman and RSA key exchanges or 224 bits for Elliptic Curve Diffie Hellman key exchanges.

    It reports below impacted algorithms on SSL ports for EDB,Registry etc

    PROTOCOL    CIPHER    NAME    GROUP    KEY-SIZE    FORWARD-SECRET    CLASSICAL-STRENGTH    QUANTUM-STRENGTH
    TLSv1.2    DHE-RSA-AES256-GCM-SHA384    DHE         1024    yes    80    low
    TLSv1.2    DHE-RSA-AES128-GCM-SHA256    DHE         1024    yes    80    low
    TLSv1.2    DHE-RSA-AES256-SHA256    DHE         1024    yes    80    low
    TLSv1.2    DHE-RSA-AES128-SHA256    DHE         1024    yes    80    low

    We have two server one hosts the IAM ,EDB and other Perf VSE,Registry,Portal 

    I have made changes to server with VSE only but it still reports same vulnerability 

    Do i need to restart all devtest servcies on both server ?




  • 10.  RE: How to validate which cipher suites are being used in TLS?

    Broadcom Employee
    Posted Mar 02, 2023 12:35 PM

    Yes, I would restart all services on both servers.




  • 11.  RE: How to validate which cipher suites are being used in TLS?

    Posted Mar 07, 2023 12:13 PM

    Thanks Marcy.

    This resolved my issue 




  • 12.  RE: How to validate which cipher suites are being used in TLS?

    Broadcom Employee
    Posted Mar 07, 2023 12:13 PM

    That is great.