讨论区 » AAS-V9企业版 » AAS-V9企业版安全测评专区 »
SSL证书使用了弱hash算法[原理扫描]
由 何 善才 在 大约一年 之前添加
漏洞详情:
解决方案:
1、禁用一下不安全的算法
com.apusic.ciphersuite.exclude=TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,\ TLS_DHE_DSS_WITH_AES_128_CBC_SHA,\ TLS_DHE_DSS_WITH_AES_256_GCM_SHA384,\ TLS_DHE_DSS_WITH_AES_128_GCM_SHA256,\ TLS_DHE_RSA_WITH_AES_128_CBC_SHA,\ TLS_DHE_DSS_WITH_AES_256_CBC_SHA,\ TLS_DHE_RSA_WITH_AES_256_GCM_SHA384,\ TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,\ TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,\ TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,\ TLS_DHE_RSA_WITH_AES_256_CBC_SHA256,\ TLS_DHE_RSA_WITH_AES_256_CBC_SHA,\ TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384,\ TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384,\ TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,\ TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,\ TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,\ TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,\ TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,\ TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,\ TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384,\ TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384,\ TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,\ TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,\ TLS_ECDH_anon_WITH_AES_256_CBC_SHA,\ TLS_ECDH_anon_WITH_AES_128_CBC_SHA,\ TLS_ECDH_ECDSA_WITH_NULL_SHA,\ TLS_ECDH_RSA_WITH_NULL_SHA,\ TLS_ECDH_anon_WITH_NULL_SHA,\ TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,\ TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,\ TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,\ TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,\ TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,\ TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,\ TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,\ TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,\ TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,\ TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,\ TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,\ TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,\ TLS_ECDHE_ECDSA_WITH_NULL_SHA,\ TLS_ECDHE_RSA_WITH_NULL_SHA
2、ssl 协议指定为TLSv1.2
3、如果以上不行的话,需要更换中间件的证书
证书在附件下载
aas_keystore.jks (2.16 KB) aas_keystore.jks |