Dell Data Protection Server Services Peak at 100% During Vulnerability Scans
Summary: Services peak at 100% during vulnerability scans in Dell Data Protection Enterprise Edition or Virtual Edition.
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Symptoms
Affected Products:
- Dell Data Protection | Enterprise Edition
- Dell Data Protection | Virtual Edition
External vulnerability scans use multiple ciphers exploits against open ports to determine potential service susceptibility. These scans may cause Dell Data Protection server CPUs to peak at 100%, resulting in service failures.
Dell Data Protection server service logs record these various connection attempts:
2014-03-16 22:12:40,318 WARN org.eclipse.jetty.server.CookieCutter [qtp871389427-83] - java.lang.IllegalArgumentException: Cookie name "5/*%7Cpass" is a reserved token 2014-03-16 22:15:39,366 WARN org.eclipse.jetty.io.nio.SslSelectChannelEndPoint [qtp871389427-82] - 157.126.223.250:43063 javax.net.ssl.SSLException: Unsupported record version Unknown-4.0 2014-03-16 22:15:39,366 WARN org.eclipse.jetty.io.nio.SslSelectChannelEndPoint [qtp871389427-84] - 157.126.223.250:43065 javax.net.ssl.SSLException: Unsupported record version Unknown-4.153 2014-03-16 22:15:44,945 WARN org.eclipse.jetty.io.nio.SslSelectChannelEndPoint [qtp871389427-83] - 157.126.223.250:43341 javax.net.ssl.SSLException: Unrecognized SSL message, plaintext connection? 2014-03-16 22:15:45,882 WARN org.eclipse.jetty.io.nio.SslSelectChannelEndPoint [qtp871389427-82] - 157.126.223.250:43427 javax.net.ssl.SSLException: Unsupported SSL v2.0 ClientHello 2014-03-16 22:16:29,992 WARN org.eclipse.jetty.io.nio.SslSelectChannelEndPoint [qtp871389427-93] - 157.126.223.2 50:48333 javax.net.ssl.SSLException: Unsupported SSL v2.0 ClientHello 2014-03-16 22:17:18,773 WARN org.eclipse.jetty.io.nio.SslSelectChannelEndPoint [qtp871389427-87] - 157.126.223.250:58828 javax.net.ssl.SSLHandshakeException: bad handshake record MAC
Cause
Not Applicable
Resolution
In order to prevent Dell Data Protection server services from failing upgrade:
- Dell Data Protection | Enterprise Edition Server to v8.3.1 Rollup Patch 3 or later
- Dell Data Protection | Virtual Edition Server to v8.5.0 or later
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.
Affected Products
Dell EncryptionArticle Properties
Article Number: 000129394
Article Type: Solution
Last Modified: 04 Jan 2024
Version: 10
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.