<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL/TLS: Certificate Signed Using A Weak Signature Algorithm in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssl-tls-certificate-signed-using-a-weak-signature-algorithm/m-p/4570060#M1088248</link>
    <description>&lt;P&gt;Thank you for the insight, to answer your question yes I am using HTTP as a server. does the process needs a reboot on the device and can it affect the hosts communicating to the switch?&lt;/P&gt;</description>
    <pubDate>Mon, 14 Mar 2022 16:12:59 GMT</pubDate>
    <dc:creator>PaoloArnedo</dc:creator>
    <dc:date>2022-03-14T16:12:59Z</dc:date>
    <item>
      <title>SSL/TLS: Certificate Signed Using A Weak Signature Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/ssl-tls-certificate-signed-using-a-weak-signature-algorithm/m-p/4570022#M1088243</link>
      <description>&lt;P&gt;Hello our switch&amp;nbsp;Cisco WS-C2960L-SM-24PS has this vulnerability and the recommended solution to this is to&amp;nbsp;&lt;SPAN&gt;obtain new SHA-2 signed SSL/TLS certificates to avoid web browser SSL/TLS certificate warnings. Can you please guide me on how to do this or suggest some commands that I can do on the device. thanks in advance&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2022 15:27:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-tls-certificate-signed-using-a-weak-signature-algorithm/m-p/4570022#M1088243</guid>
      <dc:creator>PaoloArnedo</dc:creator>
      <dc:date>2022-03-14T15:27:08Z</dc:date>
    </item>
    <item>
      <title>Re: SSL/TLS: Certificate Signed Using A Weak Signature Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/ssl-tls-certificate-signed-using-a-weak-signature-algorithm/m-p/4570048#M1088246</link>
      <description>&lt;P&gt;check self signed certificate (and clients also required to trust that certificate) - do you have PKI infra structore&amp;nbsp; inside ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/215118-ios-self-signed-certificate-expiration-o.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/215118-ios-self-signed-certificate-expiration-o.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2022 16:03:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-tls-certificate-signed-using-a-weak-signature-algorithm/m-p/4570048#M1088246</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-03-14T16:03:26Z</dc:date>
    </item>
    <item>
      <title>Re: SSL/TLS: Certificate Signed Using A Weak Signature Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/ssl-tls-certificate-signed-using-a-weak-signature-algorithm/m-p/4570053#M1088247</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/979712"&gt;@PaoloArnedo&lt;/a&gt; are you actually using the HTTP or HTTPS server on the switch to manage the device? If not, disable them and then the switch won't be listening on tcp/443.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are, create a new trustpoint and authenticate/enroll the certificate to generate a CSR, sign the certificate from your internal CA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Example trustpoint:&lt;/P&gt;
&lt;PRE class="wp-block-preformatted"&gt;&lt;SPAN&gt;crypto pki trustpoint LAB_PKI&lt;/SPAN&gt;
 &lt;SPAN&gt;enrollment terminal &lt;/SPAN&gt;
 &lt;SPAN&gt;revocation-check none&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;once the signed certificate has been imported, assign to the trustpoint&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;ip http secure-trustpoint LAB_PKI&lt;/PRE&gt;
&lt;P&gt;Delete the old trustpoint.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2022 16:08:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-tls-certificate-signed-using-a-weak-signature-algorithm/m-p/4570053#M1088247</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-14T16:08:25Z</dc:date>
    </item>
    <item>
      <title>Re: SSL/TLS: Certificate Signed Using A Weak Signature Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/ssl-tls-certificate-signed-using-a-weak-signature-algorithm/m-p/4570060#M1088248</link>
      <description>&lt;P&gt;Thank you for the insight, to answer your question yes I am using HTTP as a server. does the process needs a reboot on the device and can it affect the hosts communicating to the switch?&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2022 16:12:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-tls-certificate-signed-using-a-weak-signature-algorithm/m-p/4570060#M1088248</guid>
      <dc:creator>PaoloArnedo</dc:creator>
      <dc:date>2022-03-14T16:12:59Z</dc:date>
    </item>
    <item>
      <title>Re: SSL/TLS: Certificate Signed Using A Weak Signature Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/ssl-tls-certificate-signed-using-a-weak-signature-algorithm/m-p/4570064#M1088249</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/979712"&gt;@PaoloArnedo&lt;/a&gt; the web interface (http or https) is for management purposes only, so it will not affect the connected hosts. No it does not require a reboot.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2022 16:14:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-tls-certificate-signed-using-a-weak-signature-algorithm/m-p/4570064#M1088249</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-14T16:14:48Z</dc:date>
    </item>
    <item>
      <title>Re: SSL/TLS: Certificate Signed Using A Weak Signature Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/ssl-tls-certificate-signed-using-a-weak-signature-algorithm/m-p/4570067#M1088251</link>
      <description>&lt;P&gt;....&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2022 16:57:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-tls-certificate-signed-using-a-weak-signature-algorithm/m-p/4570067#M1088251</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-03-14T16:57:40Z</dc:date>
    </item>
    <item>
      <title>Re: SSL/TLS: Certificate Signed Using A Weak Signature Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/ssl-tls-certificate-signed-using-a-weak-signature-algorithm/m-p/4570093#M1088252</link>
      <description>&lt;P&gt;thank you! also may I ask, how do I d&lt;SPAN&gt;eploy (Ephemeral) Elliptic-Curve Diffie-Hellman (ECDHE) or use a 2048-bit or stronger Diffie-Hellman group on the device?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2022 16:48:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-tls-certificate-signed-using-a-weak-signature-algorithm/m-p/4570093#M1088252</guid>
      <dc:creator>PaoloArnedo</dc:creator>
      <dc:date>2022-03-14T16:48:56Z</dc:date>
    </item>
  </channel>
</rss>

