Fixing ssl/tls vulnerabilities on CentOS 7.1

OpenSSL 1.0.1e is the latest available version for CentOS 7.1
By default, all ciphers and macs are enabled. To fix the SSL/TLS vulnerabilities, the weak ciphers and macs must be explicitly disabled as follows.
In the /etc/ssh/sshd_config, the following two lines must be added :


Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com

MACs hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160

Restart the sshd unit :

systemctl status sshd

Checking the sshd unit log file :

journalctl -u sshd.service –since yesterday

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s