11-04-2019 03:49 AM
Hello all,
I am trying to get an A+ in the following website: https://www.htbridge.com/ssl/ for a SSL webvpn domain configured on an ASA FW. For the moment I am just able to get an A and I am getting the following "Weakness" according to this domain scanner (I have also attached a image with more detailed explanation about the weakness).VPN and AnyConnect
** Server does not support OCSP Stapling
I have found this topic in this forum but without answers: https://community.cisco.com/t5/vpn-and-anyconnect/asa-support-for-ocsp-stapling/td-p/2917089
DO you know if the ASA supports OSCP Stapling at any version?
** Bo support of TLSv1.3
I have not found anything on Internet concerning the TLSv1.3 support, just this topic where someone said that the ASA should support it since 9.3+ version: https://community.cisco.com/t5/vpn-and-anyconnect/asa-and-tls-1-3/td-p/2856689
My ASA is on version 9.4, but I am still getting this error. Can you please confirm which version I need to have TLSv1.3 support?.
** Server does not provide HSTS
According to this topic, I need ASA version 9.8(2) to solve this issue: https://community.cisco.com/t5/vpn-and-anyconnect/http-strict-transport-security-on-asa/td-p/3060653
Can anyone please confirm if this version has fixed the issue for you?
** Server does not support secure server-initiated renegotiation
Just found this: https://community.cisco.com/t5/firewalls/asa-5500x-ssl-secure-renegotiation-and-forward-secrecy/td-p/3082478
Has someone had luck configuring this on ASA?
** This domain does not have a Certification Authority Authorization (CAA) record
This looks like a certificate issue and not an ASA issue.
** The RSA certificate provided is NOT an Extended Validation (EV) certificate
This looks like a certificate issue and not an ASA issue.
** Server does not provide HPKP
I just found this on Internet, so it looks like the ASA does not support HPKP. At least not in the version 9.7(1): https://quickview.cloudapps.cisco.com/quickview/bug/CSCve06518
Do you know if there is a version which supports HPKP?
As a side question, do you know which of the weakness should I fix in order to get an A+ in this domain scanner? Or should I fix all the issues in order to get an A+? Thank you very much.
Best Regards.
Solved! Go to Solution.
11-04-2019 09:16 AM
I checked one of my "well-configured" VPNs (running on an ASA with Firepower Threat Defense 6.4.0.6) and it reports an "A+" score.
https://www.immuniweb.com/ssl/?id=6Hc7Ab1j
It hits most of the same issues you reported.
Some of these checks are really designed for web servers and not the ASA SSL VPN per se so i don't lose any sleep over the distinction between an A and an A+. By tightening things down as far as you have already you are ahead of 95% of the implementations out there.
11-04-2019 09:16 AM
I checked one of my "well-configured" VPNs (running on an ASA with Firepower Threat Defense 6.4.0.6) and it reports an "A+" score.
https://www.immuniweb.com/ssl/?id=6Hc7Ab1j
It hits most of the same issues you reported.
Some of these checks are really designed for web servers and not the ASA SSL VPN per se so i don't lose any sleep over the distinction between an A and an A+. By tightening things down as far as you have already you are ahead of 95% of the implementations out there.
11-04-2019 02:15 PM
Marvin already gave all the needed info. Two more things to consider:
1) TLS 1.3: I don't remember the referenced discussion, but I was answering for TLS 1.2 there and not for TLS 1.3.
2) I would question the usefulness of a TLS-test in general if they mark the absence of an EV-certificate as a vulnerability.
https://scotthelme.co.uk/extended-validation-not-so-extended/
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide