[MIRTH-1924] Disable weak SSL ciphers in Jetty server Created: 15/Aug/11 Updated: 19/Jan/12 Resolved: 19/Jan/12 Status: Project: Component/s: Affects Version/s: Fix Version/s: Closed Mirth Connect Server 2.1.0, 2.1.1 Type: Reporter: Resolution: Labels: Remaining Estimate: Time Spent: Original Estimate: Environment: Improvement stevier Fixed None Not Specified Issue Links: Cloners clones MIRTH-412 Disable weak SSL ciphers in Jetty server 2.2.0 RC 1, 2.2.0 Priority: Assignee: Votes: Minor Gerald Bortis 0 Not Specified Not Specified Any Platform Description Weak ssl ciphers are supported by built in Jetty https server. Change to strong ciphers. Jetty howto: http://docs.codehaus.org/display/JETTY/SSL+Cipher+Suites Nessus output: Synopsis : The remote service supports the use of weak SSL ciphers. Description : The remote host supports the use of SSL ciphers that offer either weak encryption or no encryption at all. See also : Closed http://www.openssl.org/docs/apps/ciphers.html Solution : Reconfigure the affected application if possible to avoid use of weak ciphers. Risk factor : Low / CVSS Base Score : 2 (AV:R/AC:L/Au:NR/C /A:N/I:N/B:N) Plugin output : Here is a list of the SSL ciphers supported by the remote server : Low Strength Ciphers (< 56-bit key) SSLv3 EXP-EDH-DSS-DES-CBC-SHA Kx=DH(512) Au=DSS Enc=DES(40) Mac=SHA1 export TLSv1 EXP-EDH-DSS-DES-CBC-SHA Kx=DH(512) Au=DSS Enc=DES(40) Mac=SHA1 export Medium Strength Ciphers (>= 56-bit and < 112-bit key) SSLv3 EDH-DSS-DES-CBC-SHA Kx=DH Au=DSS Enc=DES(56) Mac=SHA1 TLSv1 EDH-DSS-DES-CBC-SHA Kx=DH Au=DSS Enc=DES(56) Mac=SHA1 High Strength Ciphers (>= 112-bit key) SSLv3 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES(168) Mac=SHA1 TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES(168) Mac=SHA1 DHE-DSS-AES128-SHA Kx=DH Au=DSS Enc=AES(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx= {key exchange} Au= {authentication} Enc= {symmetric encryption method} Mac= {message authentication code} {export flag} Nessus ID : 21643 Comments Comment by Gerald Bortis [ 19/Aug/11 ] Disabled low and medium strength cipers for SSL. Comment by Gerald Bortis [ 25/Oct/11 ] Updated disabled cipher list from this blog article: http://tux.hk/index.php?m=04&y=09&entry=entry090416-140738 Generated at Tue Feb 09 07:34:14 PST 2016 using JIRA 6.2.7#6265sha1:91604a8de81892a3e362e0afee505432f29579b0.