Closed sindarina closed 9 years ago
Initially poked via Twitter, on January 22nd; https://twitter.com/sindarina/status/558272248680038401
No response.
Notified via 'webteam@drobo.com'.
No change;
Target: myproducts.drobo.com:443
prio ciphersuite protocols pfs_keysize
1 RC4-SHA TLSv1,TLSv1.1,TLSv1.2
2 RC4-MD5 TLSv1,TLSv1.1,TLSv1.2
3 DHE-RSA-AES256-GCM-SHA384 TLSv1.2 DH,2048bits
4 DHE-RSA-AES256-SHA256 TLSv1.2 DH,2048bits
5 DHE-RSA-AES256-SHA TLSv1,TLSv1.1,TLSv1.2 DH,2048bits
6 DHE-RSA-CAMELLIA256-SHA TLSv1,TLSv1.1,TLSv1.2 DH,2048bits
7 AES256-GCM-SHA384 TLSv1.2
8 AES256-SHA256 TLSv1.2
9 AES256-SHA TLSv1,TLSv1.1,TLSv1.2
10 CAMELLIA256-SHA TLSv1,TLSv1.1,TLSv1.2
11 DHE-RSA-AES128-GCM-SHA256 TLSv1.2 DH,2048bits
12 DHE-RSA-AES128-SHA256 TLSv1.2 DH,2048bits
13 DHE-RSA-AES128-SHA TLSv1,TLSv1.1,TLSv1.2 DH,2048bits
14 DHE-RSA-CAMELLIA128-SHA TLSv1,TLSv1.1,TLSv1.2 DH,2048bits
15 EDH-RSA-DES-CBC3-SHA TLSv1,TLSv1.1,TLSv1.2 DH,2048bits
16 AES128-GCM-SHA256 TLSv1.2
17 AES128-SHA256 TLSv1.2
18 AES128-SHA TLSv1,TLSv1.1,TLSv1.2
19 CAMELLIA128-SHA TLSv1,TLSv1.1,TLSv1.2
20 DES-CBC3-SHA TLSv1,TLSv1.1,TLSv1.2
Certificate: trusted, 2048 bit, sha256WithRSAEncryption signature
TLS ticket lifetime hint: 300
OCSP stapling: not supported
Server side cipher ordering
No change.
Cipherscan Analysis Results
myproducts.drobo.com:443 has bad ssl/tls
Things that are bad:
* remove cipher RC4-SHA
* remove cipher RC4-MD5
* remove cipher EDH-RSA-DES-CBC3-SHA
Changes needed to match the intermediate level:
* remove cipher RC4-SHA
* remove cipher RC4-MD5
* remove cipher EDH-RSA-DES-CBC3-SHA
* consider enabling OCSP Stapling
Changes needed to match the modern level:
* remove cipher RC4-SHA
* remove cipher RC4-MD5
* remove cipher DHE-RSA-CAMELLIA256-SHA
* remove cipher AES256-GCM-SHA384
* remove cipher AES256-SHA256
* remove cipher AES256-SHA
* remove cipher CAMELLIA256-SHA
* remove cipher DHE-RSA-CAMELLIA128-SHA
* remove cipher EDH-RSA-DES-CBC3-SHA
* remove cipher AES128-GCM-SHA256
* remove cipher AES128-SHA256
* remove cipher AES128-SHA
* remove cipher CAMELLIA128-SHA
* remove cipher DES-CBC3-SHA
* disable TLSv1
* consider enabling OCSP Stapling
No change.
myproducts.drobo.com:443 has bad ssl/tls
Things that are bad:
* remove cipher RC4-SHA
* remove cipher RC4-MD5
* remove cipher EDH-RSA-DES-CBC3-SHA
Changes needed to match the intermediate level:
* remove cipher RC4-SHA
* remove cipher RC4-MD5
* remove cipher EDH-RSA-DES-CBC3-SHA
* consider enabling OCSP Stapling
Changes needed to match the modern level:
* remove cipher RC4-SHA
* remove cipher RC4-MD5
* remove cipher DHE-RSA-CAMELLIA256-SHA
* remove cipher AES256-GCM-SHA384
* remove cipher AES256-SHA256
* remove cipher AES256-SHA
* remove cipher CAMELLIA256-SHA
* remove cipher DHE-RSA-CAMELLIA128-SHA
* remove cipher EDH-RSA-DES-CBC3-SHA
* remove cipher AES128-GCM-SHA256
* remove cipher AES128-SHA256
* remove cipher AES128-SHA
* remove cipher CAMELLIA128-SHA
* remove cipher DES-CBC3-SHA
* disable TLSv1
* consider enabling OCSP Stapling
No change.
No change.
Target: myproducts.drobo.com:443
prio ciphersuite protocols pfs_keysize
1 RC4-SHA TLSv1,TLSv1.1,TLSv1.2
2 RC4-MD5 TLSv1,TLSv1.1,TLSv1.2
3 DHE-RSA-AES256-GCM-SHA384 TLSv1.2 DH,2048bits
4 DHE-RSA-AES256-SHA256 TLSv1.2 DH,2048bits
5 DHE-RSA-AES256-SHA TLSv1,TLSv1.1,TLSv1.2 DH,2048bits
6 DHE-RSA-CAMELLIA256-SHA TLSv1,TLSv1.1,TLSv1.2 DH,2048bits
7 AES256-GCM-SHA384 TLSv1.2
8 AES256-SHA256 TLSv1.2
9 AES256-SHA TLSv1,TLSv1.1,TLSv1.2
10 CAMELLIA256-SHA TLSv1,TLSv1.1,TLSv1.2
11 DHE-RSA-AES128-GCM-SHA256 TLSv1.2 DH,2048bits
12 DHE-RSA-AES128-SHA256 TLSv1.2 DH,2048bits
13 DHE-RSA-AES128-SHA TLSv1,TLSv1.1,TLSv1.2 DH,2048bits
14 DHE-RSA-CAMELLIA128-SHA TLSv1,TLSv1.1,TLSv1.2 DH,2048bits
15 EDH-RSA-DES-CBC3-SHA TLSv1,TLSv1.1,TLSv1.2 DH,2048bits
16 AES128-GCM-SHA256 TLSv1.2
17 AES128-SHA256 TLSv1.2
18 AES128-SHA TLSv1,TLSv1.1,TLSv1.2
19 CAMELLIA128-SHA TLSv1,TLSv1.1,TLSv1.2
20 DES-CBC3-SHA TLSv1,TLSv1.1,TLSv1.2
Certificate: trusted, 2048 bit, sha256WithRSAEncryption signature
TLS ticket lifetime hint: 300
OCSP stapling: not supported
Server side cipher ordering
No change.
As there has been no movement whatsoever on this ticket, I am marking it as unresolved, and closing it as such. Review later this year.
SSL Server Test Results https://www.ssllabs.com/ssltest/analyze.html?d=myproducts.drobo.com (B)
Cipherscan Results
Verdict Bad cipher ordering, RC4 preferred, no ECDHE ciphers despite support for TLSv1.2; not as big a mess as others, but definitely needs some work.