Messaging Gateway

 View Only
  • 1.  SMG 10.6.0-7 insecure TLS Ciphers (RC4)

    Posted Apr 14, 2016 10:05 AM

    There seems to be a bug in the way TLS ciphers are handled in SMG 10.6.0-7. This is a new installation of version 10.6.0-5 upgraded to 10.6.0-7. When a ran a PCI scan I noticed that insecure ciphers were still supported even though the option "Disable support for SSLv3 and earlier protocols in all SMTP TLS conversations" is enabled.

    According to the following webpage https://support.symantec.com/en_US/article.TECH156249.html if sslv3 is disabled only the following ciphers should be enabled:

    TLS_Ciphers = ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:-LOW:-SSLv2:-EXP:-eNULL:-SSLv3

    ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AESGCM(256) Mac=AEAD
    ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESGCM(256) Mac=AEAD
    ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AES(256)  Mac=SHA384
    ECDHE-ECDSA-AES256-SHA384 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AES(256)  Mac=SHA384
    DHE-DSS-AES256-GCM-SHA384 TLSv1.2 Kx=DH       Au=DSS  Enc=AESGCM(256) Mac=AEAD
    DHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=DH       Au=RSA  Enc=AESGCM(256) Mac=AEAD
    DHE-RSA-AES256-SHA256   TLSv1.2 Kx=DH       Au=RSA  Enc=AES(256)  Mac=SHA256
    DHE-DSS-AES256-SHA256   TLSv1.2 Kx=DH       Au=DSS  Enc=AES(256)  Mac=SHA256
    ECDH-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH/RSA Au=ECDH Enc=AESGCM(256) Mac=AEAD
    ECDH-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH/ECDSA Au=ECDH Enc=AESGCM(256) Mac=AEAD
    ECDH-RSA-AES256-SHA384  TLSv1.2 Kx=ECDH/RSA Au=ECDH Enc=AES(256)  Mac=SHA384
    ECDH-ECDSA-AES256-SHA384 TLSv1.2 Kx=ECDH/ECDSA Au=ECDH Enc=AES(256)  Mac=SHA384
    AES256-GCM-SHA384       TLSv1.2 Kx=RSA      Au=RSA  Enc=AESGCM(256) Mac=AEAD
    AES256-SHA256           TLSv1.2 Kx=RSA      Au=RSA  Enc=AES(256)  Mac=SHA256
    ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AESGCM(128) Mac=AEAD
    ECDHE-ECDSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESGCM(128) Mac=AEAD
    ECDHE-RSA-AES128-SHA256 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AES(128)  Mac=SHA256
    ECDHE-ECDSA-AES128-SHA256 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AES(128)  Mac=SHA256
    DHE-DSS-AES128-GCM-SHA256 TLSv1.2 Kx=DH       Au=DSS  Enc=AESGCM(128) Mac=AEAD
    DHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=DH       Au=RSA  Enc=AESGCM(128) Mac=AEAD
    DHE-RSA-AES128-SHA256   TLSv1.2 Kx=DH       Au=RSA  Enc=AES(128)  Mac=SHA256
    DHE-DSS-AES128-SHA256   TLSv1.2 Kx=DH       Au=DSS  Enc=AES(128)  Mac=SHA256
    ECDH-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH/RSA Au=ECDH Enc=AESGCM(128) Mac=AEAD
    ECDH-ECDSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH/ECDSA Au=ECDH Enc=AESGCM(128) Mac=AEAD
    ECDH-RSA-AES128-SHA256  TLSv1.2 Kx=ECDH/RSA Au=ECDH Enc=AES(128)  Mac=SHA256
    ECDH-ECDSA-AES128-SHA256 TLSv1.2 Kx=ECDH/ECDSA Au=ECDH Enc=AES(128)  Mac=SHA256
    AES128-GCM-SHA256       TLSv1.2 Kx=RSA      Au=RSA  Enc=AESGCM(128) Mac=AEAD
    AES128-SHA256           TLSv1.2 Kx=RSA      Au=RSA  Enc=AES(128)  Mac=SHA256

    When I check with openssl using the command below I get these ciphers:

    sslscan --no-failed --starttls-smtp  --no-heartbleed --get-certficate <smg-ip-address>:25
    Version: 1.10.0 Windows 64-bit (Mingw)
    OpenSSL 1.0.2 22 Jan 2015

    Testing SSL server <smg-ip-address> on port 25

      TLS renegotiation:
    Secure session renegotiation supported

      TLS Compression:
    Compression disabled

      Supported Server Cipher(s):
    Accepted  TLSv1.0  256 bits  DHE-RSA-AES256-SHA
    Accepted  TLSv1.0  256 bits  DHE-RSA-CAMELLIA256-SHA
    Accepted  TLSv1.0  256 bits  AES256-SHA
    Accepted  TLSv1.0  256 bits  CAMELLIA256-SHA
    Accepted  TLSv1.0  128 bits  DHE-RSA-AES128-SHA
    Accepted  TLSv1.0  128 bits  DHE-RSA-SEED-SHA
    Accepted  TLSv1.0  128 bits  DHE-RSA-CAMELLIA128-SHA
    Accepted  TLSv1.0  128 bits  AES128-SHA
    Accepted  TLSv1.0  128 bits  SEED-SHA
    Accepted  TLSv1.0  128 bits  CAMELLIA128-SHA
    Accepted  TLSv1.0  128 bits  IDEA-CBC-SHA
    Accepted  TLSv1.0  128 bits  RC4-SHA
    Accepted  TLSv1.0  128 bits  RC4-MD5
    Accepted  TLSv1.0  112 bits  EDH-RSA-DES-CBC3-SHA
    Accepted  TLSv1.0  112 bits  DES-CBC3-SHA
    Accepted  TLSv1.1  256 bits  DHE-RSA-AES256-SHA
    Accepted  TLSv1.1  256 bits  DHE-RSA-CAMELLIA256-SHA
    Accepted  TLSv1.1  256 bits  AES256-SHA
    Accepted  TLSv1.1  256 bits  CAMELLIA256-SHA
    Accepted  TLSv1.1  128 bits  DHE-RSA-AES128-SHA
    Accepted  TLSv1.1  128 bits  DHE-RSA-SEED-SHA
    Accepted  TLSv1.1  128 bits  DHE-RSA-CAMELLIA128-SHA
    Accepted  TLSv1.1  128 bits  AES128-SHA
    Accepted  TLSv1.1  128 bits  SEED-SHA
    Accepted  TLSv1.1  128 bits  CAMELLIA128-SHA
    Accepted  TLSv1.1  128 bits  IDEA-CBC-SHA
    Accepted  TLSv1.1  128 bits  RC4-SHA
    Accepted  TLSv1.1  128 bits  RC4-MD5
    Accepted  TLSv1.1  112 bits  EDH-RSA-DES-CBC3-SHA
    Accepted  TLSv1.1  112 bits  DES-CBC3-SHA
    Accepted  TLSv1.2  256 bits  DHE-RSA-AES256-GCM-SHA384
    Accepted  TLSv1.2  256 bits  DHE-RSA-AES256-SHA256
    Accepted  TLSv1.2  256 bits  DHE-RSA-AES256-SHA
    Accepted  TLSv1.2  256 bits  DHE-RSA-CAMELLIA256-SHA
    Accepted  TLSv1.2  256 bits  AES256-GCM-SHA384
    Accepted  TLSv1.2  256 bits  AES256-SHA256
    Accepted  TLSv1.2  256 bits  AES256-SHA
    Accepted  TLSv1.2  256 bits  CAMELLIA256-SHA
    Accepted  TLSv1.2  128 bits  DHE-RSA-AES128-GCM-SHA256
    Accepted  TLSv1.2  128 bits  DHE-RSA-AES128-SHA256
    Accepted  TLSv1.2  128 bits  DHE-RSA-AES128-SHA
    Accepted  TLSv1.2  128 bits  DHE-RSA-SEED-SHA
    Accepted  TLSv1.2  128 bits  DHE-RSA-CAMELLIA128-SHA
    Accepted  TLSv1.2  128 bits  AES128-GCM-SHA256
    Accepted  TLSv1.2  128 bits  AES128-SHA256
    Accepted  TLSv1.2  128 bits  AES128-SHA
    Accepted  TLSv1.2  128 bits  SEED-SHA
    Accepted  TLSv1.2  128 bits  CAMELLIA128-SHA
    Accepted  TLSv1.2  128 bits  IDEA-CBC-SHA
    Accepted  TLSv1.2  128 bits  RC4-SHA
    Accepted  TLSv1.2  128 bits  RC4-MD5
    Accepted  TLSv1.2  112 bits  EDH-RSA-DES-CBC3-SHA
    Accepted  TLSv1.2  112 bits  DES-CBC3-SHA

      Preferred Server Cipher(s):
    TLSv1.0  256 bits  DHE-RSA-AES256-SHA
    TLSv1.1  256 bits  DHE-RSA-AES256-SHA
    TLSv1.2  256 bits  DHE-RSA-AES256-GCM-SHA384

      SSL Certificate:
    Signature Algorithm: sha256WithRSAEncryption
    RSA Key Strength:    2048

    Did anyone else notice this beaviour ?

    If I run the sslscan with the sslv3 parameter no ciphers are supported so sslv3 is indeed disabled.

    sslscan --no-failed --starttls-smtp --ssl3  --no-heartbleed --get-certficate <smg-ip-address>:25
    Version: 1.10.0 Windows 64-bit (Mingw)
    OpenSSL 1.0.2 22 Jan 2015

    Testing SSL server <smg-ip-address> on port 25

      TLS renegotiation:
    Secure session renegotiation supported

      TLS Compression:
    Compression disabled

      Supported Server Cipher(s):

      Preferred Server Cipher(s):

      SSL Certificate:
    Signature Algorithm: sha256WithRSAEncryption
    RSA Key Strength:    2048

     



  • 2.  RE: SMG 10.6.0-7 insecure TLS Ciphers (RC4)

    Posted Apr 18, 2016 04:03 AM

    Hi,

    Yes, i already requested that - got a official answer from support equal to your listinig. The article in KB is still not up2date.

    There's a missmatch between ecelerity.conf and reality. If you've got the need (as i did) open a incident and request a official statement.

    Just to be shure, https ciphers for cc differ from the smtp-tls ciphers ...

    According rc4, supposedly it's still requested by fips140 - it was on the fips list - years ago ;-)

    Regards

    Thomas



  • 3.  RE: SMG 10.6.0-7 insecure TLS Ciphers (RC4)

    Posted Apr 18, 2016 07:36 AM

    Hi Thomas,

     

    Thank you for reply. I will open a case with support and see what happens.

     

     



  • 4.  RE: SMG 10.6.0-7 insecure TLS Ciphers (RC4)

    Broadcom Employee
    Posted May 03, 2016 10:47 AM

    I updated the KB: https://support.symantec.com/en_US/article.TECH234747.html

     

    Cause

    Solution



  • 5.  RE: SMG 10.6.0-7 insecure TLS Ciphers (RC4)

    Posted May 04, 2016 01:48 AM

    Hi,

    Thanks for the KB-Update!

     

    Regards

    Thomas