Vulnerability repair enabled unsafe TLS1.0, TLS1.1 protocols

Vulnerability description

The TLS 1.0 and TLS 1.1 protocols use weak encryption algorithms that have major security holes and are vulnerable to downgrade attacks.

Repair plan

Enable support for TLS 1.2 or 1.3, and disable support for TLS 1.0 and TLS 1.1

nginx modify configuration file

ssl_protocols TLSv1.2 TLSv1.3;

Indicates enabling TLSv1.2 TLSv1.3 and disabling other TLS protocols. Note that this configuration can only take effect if configured in the http block or default_server, and other server blocks will read the configuration in default_server.

Verify that the configuration is correct

nginx -t

Hot reloading makes the configuration take effect

nginx -s reload

verify

openssl s_client -connect XXXXX.com:443 -tls1_1 2> /dev/null | grep -i -E "cipher|protocol"

openssl s_client -connect XXXXX.com:443 -tls1 2> /dev/null | grep -i -E "cipher|protocol"

The following figure appears, indicating that the disable is successful

 

If the following figure appears, it means that the disabling failed

 

Guess you like

Origin blog.csdn.net/LIARRR/article/details/130088336