Connectrix řady MDS: Server SSL nebo TLS podporuje protokol TLS 1.1 (Transport Layer Security)
Summary: Tato chyba zabezpečení je hlášena bez jakéhokoli identifikátoru Qualys ID (QID) nebo CVE.
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Symptoms
"Server SSL (Secure Sockets Layer) nebo TLS (Transport Layer Security) podporuje protokol TLSv1.1 (Transport Layer Security)"
Threat: The scan target supports version 1.1 of the TLS protocol. That version is in the process of being deprecated and is no longer recommended. Instead the newer versions 1.2 and/or 1.3 should be used. The TLSv1.1 protocol itself does not have any currently exploitable vulnerabilities. However some vendor implementations of TLSv1.1 have weaknesses which may be exploitable. This QID is posted as potential, when servers require client certificates and we cannot complete the handshake.
Results: Podpora protokolu TLSv1.1.
Solution: Disable the use of TLSv1.1 protocol in favor of a cryptographically stronger protocol such as TLSv1.2. The following openssl commands can be used to do a manual test: openssl s_client -connect ip:port -tls1_1 If the test is successful, then the target support TLSv1.1.
Zaznamenejte výstup přepínače z následujícího příkazu:
`show file volatile:///nxapi.log` HTTPS port is 8443 Options gathered - vdc: 1, servers: 4, http: -1, https: 8443, cert: /var/nginx/cert/server.crt_vdc_1, key: /var/nginx/cert/server.key_vdc_1, sandbox: false, protocols: TLSv1.2, ciphers: false
To znamená, že protokoly TLS 1.0 a 1.1 jsou zakázané a protokol TLSv1.2 je na přepínači povolený. Proto lze chybu zabezpečení považovat za falešně pozitivní.
Cause
31. března 2021 jsou verze TLS (Transport Layer Security) 1.0 (RFC-2246) a 1.1 (RFC-4346) formálně zastaralé.
Viz Vyřazení protokolů TLS 1.0 a TLS 1.1:
Žádost o komentáře (RFC) 8996 od Internet Engineering Task Force (IETF)
Request for Comments (RFC) 8996
Viz Vyřazení protokolů TLS 1.0 a TLS 1.1:
Žádost o komentáře (RFC) 8996 od Internet Engineering Task Force (IETF)
Request for Comments (RFC) 8996
Resolution
Pokud stále přijímá protokol TLSv1 a TLSv1.1, můžete použité verze protokolu TLS nakonfigurovat ručně:
switch(config)# nxapi ssl protocols TLSv1.2 <--To enable TLSv1.2 switch(config)# no nxapi ssl protocols TLSv1 <--To disable TLSv1-disabling TLSv1 removes TLS 1.0 and 1.1.
Affected Products
Connectrix MDS-Series Firmware 9.XProducts
Connectrix MDS-Series Firmware, Connectrix MDS-Series Firmware 8.X, Connectrix MDS-Series HardwareArticle Properties
Article Number: 000224554
Article Type: Solution
Last Modified: 28 May 2025
Version: 3
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.