On Sun, Apr 29, 2012 at 5:40 PM, Mike Hoy <mho...@gmail.com> wrote:
> We use McAfee to scan our website for vulnerabilities. They claim the
> following:
>>
>> Configure SSL/TLS servers to only use TLS 1.1 or TLS 1.2 if supported.
>> Configure SSL/TLS servers to only support cipher suites that do not use
>> block ciphers. Apply patches if available.
>
> I ran #openssl version and it says we are using OpenSSL 0.9.8e-fips-rhel5 01
> Jul 2008.
>
> Do we need to upgrade our OpenSSL to upgrade our TLS/SSL server? Sorry if
> the question is way off-base but I am not a system administrator normally.
> This is new to me. We use CentOS and #yum install openssl claims it is
> already at the higest version. Any suggestions appreciated.
Use a SSL/TLS scanner to verify SSL is not available; and TLS ciphers
are available. Since you are using a FIPS build, MD5 and lesser
friends should not be available. You can use openssl from the command
line, or a tool such as http://sourceforge.net/projects/sslscan/ or
http://code.google.com/p/sslyze/.

Jeff
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to