cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
813
Views
0
Helpful
2
Replies

Prime Infrastructure SSL handshake

Dennis Nielsen
Level 1
Level 1

Hi

 

I am running Prime Infrastructure 2.2.1, where I am trying to read data out through the REST API, but I am getting some SSL Handshake error.

 

Can anybody tell me which SSL Handshake protocols are supported by PI?

1 Accepted Solution

Accepted Solutions

marce1000
VIP
VIP

%  nmap --script ssl-enum-ciphers -p 443 cisco-prime

Starting Nmap 6.40 ( http://nmap.org ) at 2015-06-02 13:44 CEST
WARNING: Running Nmap setuid, as you are doing, is a major security risk.

Nmap scan report for cisco-prime 
Host is up (0.00018s latency).
rDNS record for x.x.x.x: cisco-prime
PORT    STATE SERVICE
443/tcp open  https
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA - strong
|       TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
|       TLS_RSA_WITH_AES_128_CBC_SHA - strong
|     compressors: 
|       NULL
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA - strong
|       TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
|       TLS_RSA_WITH_AES_128_CBC_SHA - strong
|     compressors: 
|       NULL
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA - strong
|       TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
|       TLS_RSA_WITH_AES_128_CBC_SHA - strong
|     compressors: 
|       NULL
|_  least strength: strong

 

M.



-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '

View solution in original post

2 Replies 2

marce1000
VIP
VIP

%  nmap --script ssl-enum-ciphers -p 443 cisco-prime

Starting Nmap 6.40 ( http://nmap.org ) at 2015-06-02 13:44 CEST
WARNING: Running Nmap setuid, as you are doing, is a major security risk.

Nmap scan report for cisco-prime 
Host is up (0.00018s latency).
rDNS record for x.x.x.x: cisco-prime
PORT    STATE SERVICE
443/tcp open  https
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA - strong
|       TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
|       TLS_RSA_WITH_AES_128_CBC_SHA - strong
|     compressors: 
|       NULL
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA - strong
|       TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
|       TLS_RSA_WITH_AES_128_CBC_SHA - strong
|     compressors: 
|       NULL
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA - strong
|       TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
|       TLS_RSA_WITH_AES_128_CBC_SHA - strong
|     compressors: 
|       NULL
|_  least strength: strong

 

M.



-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '

M.,

Nice use of nmap. Thanks!