Dell Data Protection Server Services Peak at 100% During Vulnerability Scans

Summary: Services peak at 100% during vulnerability scans in Dell Data Protection Enterprise Edition or Virtual Edition.

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Symptoms

Affected Products:

  • Dell Data Protection | Enterprise Edition
  • Dell Data Protection | Virtual Edition

External vulnerability scans use multiple ciphers exploits against open ports to determine potential service susceptibility. These scans may cause Dell Data Protection server CPUs to peak at 100%, resulting in service failures.

Dell Data Protection server service logs record these various connection attempts:

2014-03-16 22:12:40,318 WARN org.eclipse.jetty.server.CookieCutter [qtp871389427-83] - java.lang.IllegalArgumentException: Cookie name "5/*%7Cpass" is a reserved token
2014-03-16 22:15:39,366 WARN org.eclipse.jetty.io.nio.SslSelectChannelEndPoint [qtp871389427-82] - 157.126.223.250:43063 javax.net.ssl.SSLException: Unsupported record version Unknown-4.0

2014-03-16 22:15:39,366 WARN org.eclipse.jetty.io.nio.SslSelectChannelEndPoint [qtp871389427-84] - 157.126.223.250:43065 javax.net.ssl.SSLException: Unsupported record version Unknown-4.153

2014-03-16 22:15:44,945 WARN org.eclipse.jetty.io.nio.SslSelectChannelEndPoint [qtp871389427-83] - 157.126.223.250:43341 javax.net.ssl.SSLException: Unrecognized SSL message, plaintext connection?

2014-03-16 22:15:45,882 WARN org.eclipse.jetty.io.nio.SslSelectChannelEndPoint [qtp871389427-82] - 157.126.223.250:43427 javax.net.ssl.SSLException: Unsupported SSL v2.0 ClientHello

2014-03-16 22:16:29,992 WARN org.eclipse.jetty.io.nio.SslSelectChannelEndPoint [qtp871389427-93] - 157.126.223.2
50:48333 javax.net.ssl.SSLException: Unsupported SSL v2.0 ClientHello

2014-03-16 22:17:18,773 WARN org.eclipse.jetty.io.nio.SslSelectChannelEndPoint [qtp871389427-87] - 157.126.223.250:58828 javax.net.ssl.SSLHandshakeException: bad handshake record MAC

Cause

Not Applicable

Resolution

In order to prevent Dell Data Protection server services from failing upgrade:

  • Dell Data Protection | Enterprise Edition Server to v8.3.1 Rollup Patch 3 or later
  • Dell Data Protection | Virtual Edition Server to v8.5.0 or later

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Affected Products

Dell Encryption
Article Properties
Article Number: 000129394
Article Type: Solution
Last Modified: 04 Jan 2024
Version:  10
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.