nmap.exe -sV -Pn --script ssl-dh-params 443 192.168.1.10 Starting Nmap 7.92 ( https://nmap.org ) at 2022-07-09 11:14 Nmap scan report for 192.168.1.10 Host is up (0.0033s latency). Not shown: 996 closed tcp ports (reset) … | ssl-dh-params: | VULNERABLE: | Diffie-Hellman Key Exchange Insufficient Group Strength | State: VULNERABLE | Transport Layer Security (TLS) services that use Diffie-Hellman groups | of insufficient strength, especially those using one of a few commonly | shared groups, may be susceptible to passive eavesdropping attacks. | Check results: | WEAK DH GROUP 1 | Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 | Modulus Type: Safe prime | Modulus Source: RFC2409/Oakley Group 2 | Modulus Length: 1024 | Generator Length: 8 | Public Key Length: 1024 | References: |_ https://weakdh.org
修复方案
参考[3,4],修改方案如下:
1 2 3 4
[root@node1 etc]# cat org.ops4j.pax.web.cfg ... # Excluded SSL/TLS Cipher Suites comma-separated list of Regular Expressions org.ops4j.pax.web.ssl.ciphersuites.excluded=.*NULL.*,.*RC4.*,.*MD5.*,.*DES.*,.*DSS.*,TLS_DHE.*,SSL.*,.*anon.*,.*EXPORT.*
修改后,再次使用nmap -sV -Pn --script ssl-dh-params port ip查看扫描结果,漏洞解决:
1 2 3 4 5 6 7 8 9 10 11
nmap.exe -sV -Pn --script ssl-dh-params 443 192.168.1.10(主机IP) Starting Nmap 7.92 ( https://nmap.org ) at 2022-07-07 11:53 Nmap scan report for 192.168.1.10 Host is up (0.0032s latency). Not shown: 997 closed tcp ports (reset PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.4 (protocol 2.0) 111/tcp open rpcbind 2-4 (RPC #100000) ... Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 18.74 seconds