<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic TLS 1.0 suites in server-preferred order - ssl encryption in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tls-1-0-suites-in-server-preferred-order-ssl-encryption/m-p/4090783#M1070441</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;ASA Software Version 9.1(7)23&lt;/P&gt;&lt;P&gt;Cisco ASA 5520&lt;/P&gt;&lt;P&gt;We ran a test for our VPN firewall on Qualys website and it showed some week configuration points. i.e. TLS1.2 is not enable TLS1.0 is enable. I understand&amp;nbsp; TLS1.2 is not supported in this version.&lt;/P&gt;&lt;P&gt;Under the&amp;nbsp;Cipher Suites TLS 1.0 (suites in server-preferred order) section it gives:&lt;/P&gt;&lt;P&gt;TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x39) DH 1024 bits FS WEAK 256&lt;BR /&gt;TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x33) DH 1024 bits FS WEAK 128&lt;BR /&gt;TLS_RSA_WITH_AES_256_CBC_SHA (0x35) WEAK 256&lt;BR /&gt;TLS_RSA_WITH_AES_128_CBC_SHA (0x2f) WEAK 128&lt;/P&gt;&lt;P&gt;I was expecting that when I do the show run i would see selected protocol in order. But get no match&lt;/P&gt;&lt;P&gt;#show run | i ssl encryption&lt;/P&gt;&lt;P&gt;Used search feature in notepad, same thing.&lt;/P&gt;&lt;P&gt;I see that tls1.2 support starts from version 9.3 but in software download page of ASA5520, the last update was back in 2018 and it was 9.1(7)&lt;/P&gt;&lt;P&gt;This means new hardware is needed to use tls1.2?&lt;/P&gt;&lt;P&gt;How do I check currently configured protocols and how to change it to get good ratings in Qualys ssllab test?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Fri, 22 May 2020 16:09:17 GMT</pubDate>
    <dc:creator>uzair1980</dc:creator>
    <dc:date>2020-05-22T16:09:17Z</dc:date>
    <item>
      <title>TLS 1.0 suites in server-preferred order - ssl encryption</title>
      <link>https://community.cisco.com/t5/network-security/tls-1-0-suites-in-server-preferred-order-ssl-encryption/m-p/4090783#M1070441</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;ASA Software Version 9.1(7)23&lt;/P&gt;&lt;P&gt;Cisco ASA 5520&lt;/P&gt;&lt;P&gt;We ran a test for our VPN firewall on Qualys website and it showed some week configuration points. i.e. TLS1.2 is not enable TLS1.0 is enable. I understand&amp;nbsp; TLS1.2 is not supported in this version.&lt;/P&gt;&lt;P&gt;Under the&amp;nbsp;Cipher Suites TLS 1.0 (suites in server-preferred order) section it gives:&lt;/P&gt;&lt;P&gt;TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x39) DH 1024 bits FS WEAK 256&lt;BR /&gt;TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x33) DH 1024 bits FS WEAK 128&lt;BR /&gt;TLS_RSA_WITH_AES_256_CBC_SHA (0x35) WEAK 256&lt;BR /&gt;TLS_RSA_WITH_AES_128_CBC_SHA (0x2f) WEAK 128&lt;/P&gt;&lt;P&gt;I was expecting that when I do the show run i would see selected protocol in order. But get no match&lt;/P&gt;&lt;P&gt;#show run | i ssl encryption&lt;/P&gt;&lt;P&gt;Used search feature in notepad, same thing.&lt;/P&gt;&lt;P&gt;I see that tls1.2 support starts from version 9.3 but in software download page of ASA5520, the last update was back in 2018 and it was 9.1(7)&lt;/P&gt;&lt;P&gt;This means new hardware is needed to use tls1.2?&lt;/P&gt;&lt;P&gt;How do I check currently configured protocols and how to change it to get good ratings in Qualys ssllab test?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 16:09:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tls-1-0-suites-in-server-preferred-order-ssl-encryption/m-p/4090783#M1070441</guid>
      <dc:creator>uzair1980</dc:creator>
      <dc:date>2020-05-22T16:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.0 suites in server-preferred order - ssl encryption</title>
      <link>https://community.cisco.com/t5/network-security/tls-1-0-suites-in-server-preferred-order-ssl-encryption/m-p/4090799#M1070443</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;What hardware are you using? You should consider upgrading to the latest supported version, which supports TLS 1.2 and DTLS 1.2, which is any version from 9.10.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you wish to get a good score, you should consider disabling TLS 1.0/1.1 and just use TLS/DTLS 1.2.&lt;/P&gt;
&lt;P&gt;You can specify the ciphers as below:-&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;ssl server-version tlsv1.2 dtlsv1.2&lt;BR /&gt;ssl cipher tlsv1.2 custom "ECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-GCM-SHA384 AES256-GCM-SHA384"&lt;BR /&gt;ssl cipher dtlsv1.2 custom "ECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-GCM-SHA384 AES256-GCM-SHA384"&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 15:30:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tls-1-0-suites-in-server-preferred-order-ssl-encryption/m-p/4090799#M1070443</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-05-22T15:30:55Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.0 suites in server-preferred order - ssl encryption</title>
      <link>https://community.cisco.com/t5/network-security/tls-1-0-suites-in-server-preferred-order-ssl-encryption/m-p/4090804#M1070444</link>
      <description>&lt;P&gt;This is Cisco ASA 5520. I know this is pretty old and not supported any more. Before I consider to make changes to protocol or OS version, i was looking where these are defined, either in ASDM or CLI. That i can't find. Google says that I should see, for an example, "&lt;/P&gt;&lt;P&gt;ssl encryption aes128-sha1 aes256-sha1 des-sha1"&lt;/P&gt;&lt;P&gt;but in my case this statement is not in config.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 15:37:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tls-1-0-suites-in-server-preferred-order-ssl-encryption/m-p/4090804#M1070444</guid>
      <dc:creator>uzair1980</dc:creator>
      <dc:date>2020-05-22T15:37:22Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.0 suites in server-preferred order - ssl encryption</title>
      <link>https://community.cisco.com/t5/network-security/tls-1-0-suites-in-server-preferred-order-ssl-encryption/m-p/4090816#M1070446</link>
      <description>&lt;P&gt;The exact command maybe different but the syntax on newer ASA software would be:-&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ssl cipher tlsv1 custom "DHE-RSA-AES256-SHA DHE-RSA-AES128-SHA"&lt;/STRONG&gt; potentially on older code it would be &lt;STRONG&gt;ssl encryption&lt;/STRONG&gt; ......you put the custom ciphers you wish to use in " ".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can find the ciphers supports by TLS1 as below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;ASA-1(config)# &lt;STRONG&gt;show ssl ciphers&lt;/STRONG&gt;&lt;BR /&gt;Current cipher configuration:&lt;BR /&gt;default (medium):&lt;BR /&gt;ECDHE-ECDSA-AES256-GCM-SHA384&lt;BR /&gt;ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;DHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;AES256-GCM-SHA384&lt;BR /&gt;ECDHE-ECDSA-AES256-SHA384&lt;BR /&gt;ECDHE-RSA-AES256-SHA384&lt;BR /&gt;DHE-RSA-AES256-SHA256&lt;BR /&gt;AES256-SHA256&lt;BR /&gt;ECDHE-ECDSA-AES128-GCM-SHA256&lt;BR /&gt;ECDHE-RSA-AES128-GCM-SHA256&lt;BR /&gt;DHE-RSA-AES128-GCM-SHA256&lt;BR /&gt;AES128-GCM-SHA256&lt;BR /&gt;ECDHE-ECDSA-AES128-SHA256&lt;BR /&gt;ECDHE-RSA-AES128-SHA256&lt;BR /&gt;DHE-RSA-AES128-SHA256&lt;BR /&gt;AES128-SHA256&lt;BR /&gt;DHE-RSA-AES256-SHA&lt;BR /&gt;AES256-SHA&lt;BR /&gt;DHE-RSA-AES128-SHA&lt;BR /&gt;AES128-SHA&lt;BR /&gt;DES-CBC3-SHA&lt;BR /&gt;&lt;STRONG&gt;tlsv1 (medium):&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;DHE-RSA-AES256-SHA&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;AES256-SHA&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;DHE-RSA-AES128-SHA&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;AES128-SHA&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;DES-CBC3-SHA&lt;/STRONG&gt;&lt;BR /&gt;tlsv1.1 (medium):&lt;BR /&gt;DHE-RSA-AES256-SHA&lt;BR /&gt;AES256-SHA&lt;BR /&gt;DHE-RSA-AES128-SHA&lt;BR /&gt;AES128-SHA&lt;BR /&gt;DES-CBC3-SHA&lt;BR /&gt;tlsv1.2 (medium):&lt;BR /&gt;ECDHE-ECDSA-AES256-GCM-SHA384&lt;BR /&gt;ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;DHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;AES256-GCM-SHA384&lt;BR /&gt;ECDHE-ECDSA-AES256-SHA384&lt;BR /&gt;ECDHE-RSA-AES256-SHA384&lt;BR /&gt;DHE-RSA-AES256-SHA256&lt;BR /&gt;AES256-SHA256&lt;BR /&gt;ECDHE-ECDSA-AES128-GCM-SHA256&lt;BR /&gt;ECDHE-RSA-AES128-GCM-SHA256&lt;BR /&gt;DHE-RSA-AES128-GCM-SHA256&lt;BR /&gt;&lt;BR /&gt;ASA-1(config)# &lt;STRONG&gt;ssl cipher tlsv1 custom "DHE-RSA-AES256-SHA DHE-RSA-AES128-SHA"&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 15:49:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tls-1-0-suites-in-server-preferred-order-ssl-encryption/m-p/4090816#M1070446</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-05-22T15:49:24Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.0 suites in server-preferred order - ssl encryption</title>
      <link>https://community.cisco.com/t5/network-security/tls-1-0-suites-in-server-preferred-order-ssl-encryption/m-p/4090832#M1070447</link>
      <description>&lt;P&gt;# show run | i cipher&lt;BR /&gt;&amp;lt;empty&amp;gt;&lt;/P&gt;&lt;P&gt;(config)# ssl cipher ?&lt;BR /&gt;ERROR: % Unrecognized command&lt;/P&gt;&lt;P&gt;I see that tls 1.2 support starts from 9.3 but in software download page of 5520, the last update was back in 2018 and it was 9.1(7)&lt;/P&gt;&lt;P&gt;This means new hardware is needed to use tls1,2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 16:07:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tls-1-0-suites-in-server-preferred-order-ssl-encryption/m-p/4090832#M1070447</guid>
      <dc:creator>uzair1980</dc:creator>
      <dc:date>2020-05-22T16:07:25Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.0 suites in server-preferred order - ssl encryption</title>
      <link>https://community.cisco.com/t5/network-security/tls-1-0-suites-in-server-preferred-order-ssl-encryption/m-p/4090835#M1070448</link>
      <description>&lt;P&gt;Like I said, potentially on older software the command would start ssl encryption and you put the custom ciphers you wish to use in " " like I demonstrated above&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 16:17:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tls-1-0-suites-in-server-preferred-order-ssl-encryption/m-p/4090835#M1070448</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-05-22T16:17:56Z</dc:date>
    </item>
  </channel>
</rss>

