<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS scan reveals in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/https-scan-reveals/m-p/1628714#M589927</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Was the scan from the outside or inside?&lt;/P&gt;&lt;P&gt;If you aren't using SSL VPN you can turn it off on the outside or you can disable the weak algorithyms.&lt;/P&gt;&lt;P&gt;You can specify the strong ones by typing this in under configuration mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;'ssl encryption 3des-sha1 aes128-sha1 aes256-sha1 rc4-md5'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or disabling WebVPN on outside with one of these two, not sure which one it is &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;no enable outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no webvpn&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 09 Mar 2011 03:51:50 GMT</pubDate>
    <dc:creator>trippi</dc:creator>
    <dc:date>2011-03-09T03:51:50Z</dc:date>
    <item>
      <title>HTTPS scan reveals</title>
      <link>https://community.cisco.com/t5/network-security/https-scan-reveals/m-p/1628713#M589926</link>
      <description>&lt;P&gt; I am working at a client site whom falls under PCI Security mandates.&amp;nbsp; The client is scanned by a Third party Vendor each month, and the test results are published.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The client was hit on 2 critical vulnerabilities this time around.&amp;nbsp; Both of these Critical rankings were generated against the ASA that faces the public Internet at the client site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first Critical vulnerability found was as follows:&lt;/P&gt;&lt;H5&gt;Description&lt;/H5&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The remote service uses an SSL certificate that has been signed using &lt;BR /&gt;a cryptographically weak hashing algorithm - MD2, MD4, or MD5. These &lt;BR /&gt;signature algorithms are known to be vulnerable to collision attacks. &lt;BR /&gt;In theory, a determined attacker may be able to leverage this weakness &lt;BR /&gt;to generate another certificate with the same digital signature, which &lt;BR /&gt;could allow him to masquerade as the affected service.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H5&gt;See also&lt;/H5&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://tools.ietf.org/html/rfc3279" target="_blank"&gt;http://tools.ietf.org/html/rfc3279&lt;/A&gt; &lt;BR /&gt;&lt;A href="http://www.phreedom.org/research/rogue-ca/" target="_blank"&gt;http://www.phreedom.org/research/rogue-ca/&lt;/A&gt; &lt;BR /&gt;&lt;A href="http://www.microsoft.com/technet/security/advisory/961509.mspx" target="_blank"&gt;http://www.microsoft.com/technet/security/advisory/961509.mspx&lt;/A&gt; &lt;BR /&gt;&lt;A href="http://www.kb.cert.org/vuls/id/836068" target="_blank"&gt;http://www.kb.cert.org/vuls/id/836068&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H5&gt;Solution&lt;/H5&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Contact the Certificate Authority to have the certificate reissued.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H5&gt;Risk factor&lt;/H5&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Medium / CVSS Base Score : 4.1 &lt;BR /&gt;&lt;A href="http://nvd.nist.gov/cvss.cfm?vector=(AV:N/AC:H/Au:N/C:P/I:P/A:N)&amp;amp;version=2" target="_blank"&gt;(CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H5&gt;Plugin output&lt;/H5&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the service's SSL certificate :&lt;/P&gt;&lt;P&gt;Subject Name:&lt;/P&gt;&lt;P&gt;Common Name: bhiasaop &lt;BR /&gt;Unstructured Name: bhiasaop.boarsheadinn&lt;/P&gt;&lt;P&gt;Issuer Name:&lt;/P&gt;&lt;P&gt;Common Name: bhiasaop &lt;BR /&gt;Unstructured Name: bhiasaop.boarsheadinn&lt;/P&gt;&lt;P&gt;Serial Number: F8 E5 C3 49&lt;/P&gt;&lt;P&gt;Version: 3&lt;/P&gt;&lt;P&gt;Signature Algorithm: MD5 With RSA Encryption&lt;/P&gt;&lt;P&gt;Not Valid Before: Mar 20 18:52:40 2009 GMT &lt;BR /&gt;Not Valid After: Mar 18 18:52:40 2019 GMT&lt;/P&gt;&lt;P&gt;Public Key Info:&lt;/P&gt;&lt;P&gt;Algorithm: RSA Encryption &lt;BR /&gt;Public Key: 00 82 9D AB 31 AA 1B D6 A6 26 5F 74 31 AC F6 95 44 AB F6 A0 &lt;BR /&gt;32 46 DB 02 CA B5 51 AC FB 5B 19 67 6E B6 01 D8 33 3B 8E 6B &lt;BR /&gt;A5 5A 42 CE BA 5C 7D DC A1 BE 96 86 A1 AB 26 10 69 49 B1 9C &lt;BR /&gt;6B C7 40 74 8C 8C EA 0C D5 82 AC BA 19 9D 46 6A 38 97 49 04 &lt;BR /&gt;AC B3 90 5C C3 27 83 37 31 71 AA EC 74 C4 C3 8A 73 15 32 AB &lt;BR /&gt;4F 9D FD 44 F2 E5 22 E6 B1 2F FA FB B1 A1 85 94 87 36 06 41 &lt;BR /&gt;3F 4C 2F 7D C7 9E A6 62 6F &lt;BR /&gt;Exponent: 01 00 01&lt;/P&gt;&lt;P&gt;Signature: 00 42 BA D4 57 02 C0 B1 B4 22 DF 10 64 65 F8 6B 37 6B FF C1 &lt;BR /&gt;10 F0 58 A1 02 EA 2C CB B3 A0 E1 FF 73 2A 87 B1 94 50 74 7A &lt;BR /&gt;2E CB CD B5 61 18 92 C3 CB 99 47 2A 97 3D 0A DB 6E 98 82 5F &lt;BR /&gt;9B E6 BB 03 FE 26 11 05 D8 DB 98 3F 4D B2 B6 54 E9 D7 F3 21 &lt;BR /&gt;BC 48 C6 BC 89 3E A2 C5 6E AB 81 F1 A1 11 22 A8 41 4F C5 12 &lt;BR /&gt;B4 C2 ED AC 9C 51 2A 70 17 E2 4A FB A0 D6 E8 9E C5 13 03 1E &lt;BR /&gt;2B 3B DC 97 96 A3 E7 40 10&lt;/P&gt;&lt;P&gt;Extension: Basic Constraints (2.5.29.19) &lt;BR /&gt;Critical: 1 &lt;BR /&gt;Data: 30 03 01 01 FF&lt;/P&gt;&lt;P&gt;Extension: Key Usage (2.5.29.15) &lt;BR /&gt;Critical: 1 &lt;BR /&gt;Key Usage: Digital Signature, Key Cert Signature, CRL Signature&lt;/P&gt;&lt;P&gt;Extension: Authority Key Identifier (2.5.29.35) &lt;BR /&gt;Critical: 0&lt;/P&gt;&lt;P&gt;Extension: Subject Key Identifier (2.5.29.14) &lt;BR /&gt;Critical: 0 &lt;BR /&gt;Subject Key Identifier: CB 5C 84 EE 58 15 C1 5F 4F 1C EF C6 31 54 61 A6 CF ED 38 B4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H5&gt;CVE&lt;/H5&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CVE-2004-2761&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H5&gt;BID&lt;/H5&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;11849, 33065&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H5&gt;Other reference&lt;/H5&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OSVDB:45106, OSVDB:45108, OSVDB:45127, CWE:310&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is as follows.&amp;nbsp;&amp;nbsp; Where do we install, import, or otherwise enable Certificates on the ASA for HTTPS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 2nd Critical vulnerability was reported as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H5&gt;Synopsis&lt;/H5&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The SSL certificate for this service is signed by an unknown &lt;BR /&gt;certificate authority.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H5&gt;Description&lt;/H5&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The X.509 certificate of the remote host is not signed by a known &lt;BR /&gt;public certificate authority. If the remote host is a public host in &lt;BR /&gt;production, this nullifies the use of SSL as anyone could establish a &lt;BR /&gt;man in the middle attack against the remote host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H5&gt;Solution&lt;/H5&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Purchase or generate a proper certificate for this service.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H5&gt;Risk factor&lt;/H5&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Medium / CVSS Base Score : 6.5 &lt;BR /&gt;&lt;A href="http://nvd.nist.gov/cvss.cfm?vector=(AV:N/AC:L/Au:N/C:P/I:P/A:N)&amp;amp;version=2" target="_blank"&gt;(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H5&gt;Plugin output&lt;/H5&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*** ERROR: Unknown root CA in the chain: &lt;BR /&gt;Common Name: bhiasaop &lt;BR /&gt;Unstructured Name: bhiasaop.boarsheadinn&lt;/P&gt;&lt;P&gt;Certificate chain: &lt;BR /&gt;|-Common Name: bhiasaop &lt;BR /&gt;|-Unstructured Name: bhiasaop.boarsheadinn&lt;/P&gt;&lt;P&gt;I am not sure why all of a sudden we are getting hit on these items which we have formerly been passing.&amp;nbsp; What recommendations are there to resolve this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:02:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-scan-reveals/m-p/1628713#M589926</guid>
      <dc:creator>Kevin Melton</dc:creator>
      <dc:date>2019-03-11T20:02:47Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS scan reveals</title>
      <link>https://community.cisco.com/t5/network-security/https-scan-reveals/m-p/1628714#M589927</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Was the scan from the outside or inside?&lt;/P&gt;&lt;P&gt;If you aren't using SSL VPN you can turn it off on the outside or you can disable the weak algorithyms.&lt;/P&gt;&lt;P&gt;You can specify the strong ones by typing this in under configuration mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;'ssl encryption 3des-sha1 aes128-sha1 aes256-sha1 rc4-md5'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or disabling WebVPN on outside with one of these two, not sure which one it is &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;no enable outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no webvpn&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Mar 2011 03:51:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-scan-reveals/m-p/1628714#M589927</guid>
      <dc:creator>trippi</dc:creator>
      <dc:date>2011-03-09T03:51:50Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS scan reveals</title>
      <link>https://community.cisco.com/t5/network-security/https-scan-reveals/m-p/1628715#M589928</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the response.&amp;nbsp; You nailed it.&amp;nbsp; I had turned it on last week at some point when I was in a testing mode looking&lt;/P&gt;&lt;P&gt;at the WebVPN feature.&amp;nbsp; I had indeed enabled it on the outside interface.&amp;nbsp; I disabled it, contacte&lt;SPAN style="background-color: #f8fafd;"&gt;d the Third Party scanning vendor to issue a retest, and all tested OK.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Thanks for your response.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Kevin Melton&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Mar 2011 15:11:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-scan-reveals/m-p/1628715#M589928</guid>
      <dc:creator>Kevin Melton</dc:creator>
      <dc:date>2011-03-10T15:11:11Z</dc:date>
    </item>
  </channel>
</rss>

