Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vulnerable cipher TLS_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32) still exist #1925

Open
D592 opened this issue Nov 12, 2023 · 1 comment
Open

Vulnerable cipher TLS_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32) still exist #1925

D592 opened this issue Nov 12, 2023 · 1 comment

Comments

@D592
Copy link

D592 commented Nov 12, 2023

Vulnerable cipher TLS_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32) still exist - could the VPN developers share any information how to fix the issue

Prerequisites

  • [yes] Can you reproduce?
  • [yes] Are you running the latest version of SoftEtherVPN?

SoftEther version: 4.43
Component: Server
Operating system: Linux
Architecture: 64 bit

Description

Vulnerable cipher TLS_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)

Expected behavior: not using of that cipher

Actual behavior: using of that cipher

Steps to reproduce

  1. checking the listen 443 port with network vulnerability scanner
@drasco
Copy link

drasco commented Feb 1, 2024

Wait till you find out the user can simply elect not to encrypt at all

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants