<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Another config that I forgot, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vulnerabilities-associated-with-asa-5520/m-p/2515361#M235598</link>
    <description>&lt;P&gt;Another config that I forgot, but that also could be found by an assessment, is the accepted SSL/TLS-version of the ASA. This is the default:&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;asa# sh run all ssl&lt;BR /&gt;ssl server-version any&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;Here you should change the setting to only accept TLSv1:&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;ssl server-version tlsv1-only&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;At least on up-to date operating systems I haven't seen any compatibility-issues with that.&lt;/P&gt;</description>
    <pubDate>Thu, 14 Aug 2014 06:20:53 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2014-08-14T06:20:53Z</dc:date>
    <item>
      <title>vulnerabilities associated with  ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/vulnerabilities-associated-with-asa-5520/m-p/2515355#M235589</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Scan results shows that ASA 5520 config for ipsec and anyconnect ikev2 has following vulnerability&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN"&gt;Medium strength ciphers supported-----The remote host supports the use of SSL ciphers that offer medium strength encryption, which we currently regard as those with key lengths at least 56 bits and less than 112 bits.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN"&gt;Reconfigure the affected application if possible to avoid use of medium strength ciphers.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN"&gt;ASA is not using SSL anyconnect.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;SSL config on ASL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P align="LEFT" dir="LTR"&gt;&lt;SPAN lang="EN"&gt;ssl encryption aes256-sha1 aes128-sha1 3des-sha1 des-sha1 rc4-sha1 rc4-md5&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="LEFT" dir="LTR"&gt;&lt;SPAN lang="EN"&gt;ssl trust-point ASDM_TrustPoint0 outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="LEFT" dir="LTR"&gt;&lt;SPAN lang="EN"&gt;　 anyconnect ssl dtls enable&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="LEFT" dir="LTR"&gt;&lt;SPAN lang="EN"&gt;　 anyconnect ssl keepalive none&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="LEFT" dir="LTR"&gt;&lt;SPAN lang="EN"&gt;　 anyconnect ssl rekey time none&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="LEFT" dir="LTR"&gt;&lt;SPAN lang="EN"&gt;　 anyconnect ssl rekey method none&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="LEFT" dir="LTR"&gt;&lt;SPAN lang="EN"&gt;　 anyconnect ssl compression deflate&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="LEFT" dir="LTR"&gt;&lt;SPAN lang="EN"&gt;vpn-tunnel-protocol ikev1 ssl-client&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="LEFT" dir="LTR"&gt;&amp;nbsp;&lt;/P&gt;&lt;P align="LEFT" dir="LTR"&gt;&lt;SPAN lang="EN"&gt;To fix this do i need to remove config --&lt;/SPAN&gt;anyconnect ssl dtls enable??&lt;/P&gt;&lt;P align="LEFT" dir="LTR"&gt;Also currently FIPS is not enabled on ASA should i enable to get rid of scan results?&lt;/P&gt;&lt;P align="LEFT" dir="LTR"&gt;&amp;nbsp;&lt;/P&gt;&lt;P align="LEFT" dir="LTR"&gt;Regards&lt;/P&gt;&lt;P align="LEFT" dir="LTR"&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:37:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerabilities-associated-with-asa-5520/m-p/2515355#M235589</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T04:37:35Z</dc:date>
    </item>
    <item>
      <title>Hi Mahesh, It seems that</title>
      <link>https://community.cisco.com/t5/network-security/vulnerabilities-associated-with-asa-5520/m-p/2515356#M235591</link>
      <description>&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems that still no updates from cisco against this vulnerability. They will release the new version of OS after fixing this vulnerability. You can go through the below mentioned link in detail.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Wed, 13 Aug 2014 08:57:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerabilities-associated-with-asa-5520/m-p/2515356#M235591</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-08-13T08:57:35Z</dc:date>
    </item>
    <item>
      <title>With the following line in</title>
      <link>https://community.cisco.com/t5/network-security/vulnerabilities-associated-with-asa-5520/m-p/2515357#M235593</link>
      <description>&lt;P&gt;With the following line in your config&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;&lt;SPAN lang="EN" lang="EN"&gt;ssl encryption aes256-sha1 aes128-sha1 3des-sha1 des-sha1 rc4-sha1 rc4-md5&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;DIV&gt;You are running ciphers that are weak. You should remove any rc4- and des-ciphers. If compatibility permits it, you could also remove 3des as a legacy algorithm.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Depending on your version you could also enable the ciphers "dhe-aes128-sha1" and "dhe-aes256-sha1".&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;DTLS has nothing to do with this.&lt;/DIV&gt;</description>
      <pubDate>Wed, 13 Aug 2014 12:15:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerabilities-associated-with-asa-5520/m-p/2515357#M235593</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-08-13T12:15:16Z</dc:date>
    </item>
    <item>
      <title> Hi Karsten,i checked my ASA</title>
      <link>https://community.cisco.com/t5/network-security/vulnerabilities-associated-with-asa-5520/m-p/2515358#M235595</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Karsten,&lt;/P&gt;&lt;P&gt;i checked my ASA i have below options&lt;/P&gt;&lt;P&gt;ssl encryption aes256-sha1 ?&lt;/P&gt;&lt;P&gt;configure mode commands/options:&lt;BR /&gt;&amp;nbsp; 3des-sha1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Indicate use of 3des-sha1 for ssl encryption&lt;BR /&gt;&amp;nbsp; aes128-sha1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Indicate use of aes128-sha1 for ssl encryption&lt;BR /&gt;&amp;nbsp; des-sha1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Indicate use of des-sha1 for ssl encryption&lt;BR /&gt;&amp;nbsp; dhe-aes128-sha1&amp;nbsp; Indicate use of dhe-aes128-sha1 for ssl encryption&lt;BR /&gt;&amp;nbsp; dhe-aes256-sha1&amp;nbsp; Indicate use of dhe-aes256-sha1 for ssl encryption&lt;BR /&gt;&amp;nbsp; null-sha1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Indicate use of null-sha1 for ssl encryption (NOTE: Data is NOT encrypted if this cipher is chosen)&lt;BR /&gt;&amp;nbsp; rc4-md5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Indicate use of rc4-md5 for ssl encryption&lt;BR /&gt;&amp;nbsp; rc4-sha1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Indicate use of rc4-sha1 for ssl encryption&lt;/P&gt;&lt;P&gt;so below Config will take care of all the weak ciphers?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;5520(config)# &lt;STRONG&gt;ssl encryption aes256-sha1 dhe-aes128-sha1 dhe-aes256-sha1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;and i can do this on fly as it should not cause any outage.?&lt;/P&gt;&lt;P&gt;I can simply remove current ssl encryption config and replace it with above config?&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Aug 2014 12:54:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerabilities-associated-with-asa-5520/m-p/2515358#M235595</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-08-13T12:54:10Z</dc:date>
    </item>
    <item>
      <title>yes, just set the new ciphers</title>
      <link>https://community.cisco.com/t5/network-security/vulnerabilities-associated-with-asa-5520/m-p/2515359#M235596</link>
      <description>&lt;P&gt;yes, just set the new ciphers-string and you are ready. I didn't test that, but I would assume that any running connection with a removed cipher *could* get disconnected. But you don't want them anyway and when they reconnect they will pick one of the better ciphers.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Aug 2014 14:27:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerabilities-associated-with-asa-5520/m-p/2515359#M235596</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-08-13T14:27:15Z</dc:date>
    </item>
    <item>
      <title> Hi Karsten, Many thanks for</title>
      <link>https://community.cisco.com/t5/network-security/vulnerabilities-associated-with-asa-5520/m-p/2515360#M235597</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Karsten,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks for answering my post.&lt;/P&gt;&lt;P&gt;It was pretty hard for me to find answer for this over the internet.&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Thu, 14 Aug 2014 02:35:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerabilities-associated-with-asa-5520/m-p/2515360#M235597</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-08-14T02:35:36Z</dc:date>
    </item>
    <item>
      <title>Another config that I forgot,</title>
      <link>https://community.cisco.com/t5/network-security/vulnerabilities-associated-with-asa-5520/m-p/2515361#M235598</link>
      <description>&lt;P&gt;Another config that I forgot, but that also could be found by an assessment, is the accepted SSL/TLS-version of the ASA. This is the default:&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;asa# sh run all ssl&lt;BR /&gt;ssl server-version any&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;Here you should change the setting to only accept TLSv1:&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;ssl server-version tlsv1-only&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;At least on up-to date operating systems I haven't seen any compatibility-issues with that.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Aug 2014 06:20:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerabilities-associated-with-asa-5520/m-p/2515361#M235598</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-08-14T06:20:53Z</dc:date>
    </item>
    <item>
      <title> Thanks Karsten for more</title>
      <link>https://community.cisco.com/t5/network-security/vulnerabilities-associated-with-asa-5520/m-p/2515362#M235599</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks Karsten for more update on this.&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Aug 2014 00:07:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerabilities-associated-with-asa-5520/m-p/2515362#M235599</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-08-15T00:07:17Z</dc:date>
    </item>
  </channel>
</rss>

