Alwaysonline
Verified User
I am performing PCI compliance upgrades for a client with DirectAdmin,
and the PCI vendor's report complains that DirectAdmin (they specifically say port 2222) is using weak/medium cipher suites.
I have already added 'ssl_cipher=SSLv3' to directadmin.conf as per http://www.directadmin.com/features.php?id=957, and the directadmin service has been restarted (that was yesterday).
This is on CentOS 4.8 (ancient, but not a lot I can immediately do about that), with DirectAdmin 1.37.0
The following is some info from the report:
I can add :!MEDIUM:!LOW in addition to SSLv3, but won't know if that does the trick until the scan completes another round in, say, 4 hours.
My questions:
What does the DA knowledgebase consider "PCI compliance",
and
Does the ssl_cipher option in directadmin.conf cover Apache, DA, or both?
Regards,
Bryan
and the PCI vendor's report complains that DirectAdmin (they specifically say port 2222) is using weak/medium cipher suites.
I have already added 'ssl_cipher=SSLv3' to directadmin.conf as per http://www.directadmin.com/features.php?id=957, and the directadmin service has been restarted (that was yesterday).
This is on CentOS 4.8 (ancient, but not a lot I can immediately do about that), with DirectAdmin 1.37.0
The following is some info from the report:
Here is the list of weak SSL ciphers supported by the remote server :
Null Ciphers (no encryption)
SSLv3
NULL-MD5 Kx=RSA Au=RSA Enc=None Mac=MD5
NULL-SHA Kx=RSA Au=RSA Enc=None Mac=SHA1
TLSv1
NULL-MD5 Kx=RSA Au=RSA Enc=None Mac=MD5
NULL-SHA Kx=RSA Au=RSA Enc=None Mac=SHA1
The fields above are :
{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}
Here are the medium strength SSL ciphers supported by the remote server :
Medium Strength Ciphers (>= 56-bit and < 112-bit key)
SSLv3
DES-CBC-SHA Kx=RSA Au=RSA Enc=DES(56) Mac=SHA1
TLSv1
EXP1024-DES-CBC-SHA Kx=RSA(1024) Au=RSA Enc=DES(56) Mac=SHA1 export
EXP1024-RC2-CBC-MD5 Kx=RSA(1024) Au=RSA Enc=RC2(56) Mac=MD5 export
EXP1024-RC4-MD5 Kx=RSA(1024) Au=RSA Enc=RC4(56) Mac=MD5 export
EXP1024-RC4-SHA Kx=RSA(1024) Au=RSA Enc=RC4(56) Mac=SHA1 export
DES-CBC-SHA Kx=RSA Au=RSA Enc=DES(56) Mac=SHA1
The fields above are :
{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}
I can add :!MEDIUM:!LOW in addition to SSLv3, but won't know if that does the trick until the scan completes another round in, say, 4 hours.
My questions:
What does the DA knowledgebase consider "PCI compliance",
and
Does the ssl_cipher option in directadmin.conf cover Apache, DA, or both?
Regards,
Bryan