{"id":810,"date":"2016-10-11T10:19:52","date_gmt":"2016-10-11T09:19:52","guid":{"rendered":"http:\/\/www.haxed.me.uk\/?p=810"},"modified":"2016-10-11T10:20:27","modified_gmt":"2016-10-11T09:20:27","slug":"checking-website-rackspace-load-balancers-supported-ssl-ciphers","status":"publish","type":"post","link":"https:\/\/haxed.me.uk\/index.php\/2016\/10\/11\/checking-website-rackspace-load-balancers-supported-ssl-ciphers\/","title":{"rendered":"Checking a Website or Rackspace Load Balancers Supported SSL Ciphers"},"content":{"rendered":"<p>So, you may have recently had an audit performed, or have been warned about the dangers of SSLv3, poodle attack, heartbleed and etc. You want to understand exactly which ciphers your using on the Load Balancer, cloud-server, or dedicated server. It&#8217;s actually very easy to do this with nmap. Install it first, naturally.<\/p>\n<pre>\n# CentOS \/ RedHat<br \/>\nyum install nmap<\/p>\n<p># Debian \/ Ubuntu<br \/>\napt-get install nmap<\/p>\n<p># Check for SSL ciphers<\/p>\n<p># nmap hostnamegoeshere.com --script ssl-enum-ciphers -p 443<\/p>\n<p>Starting Nmap 6.47 ( http:\/\/nmap.org ) at 2016-10-11 09:12 UTC<br \/>\nNmap scan report for 134.213.236.167<br \/>\nHost is up (0.0017s latency).<br \/>\nPORT    STATE SERVICE<br \/>\n443\/tcp open  https<br \/>\n| ssl-enum-ciphers:<br \/>\n|   SSLv3: No supported ciphers found<br \/>\n|   TLSv1.0:<br \/>\n|     ciphers:<br \/>\n|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong<br \/>\n|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA - strong<br \/>\n|       TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong<br \/>\n|       TLS_RSA_WITH_AES_128_CBC_SHA - strong<br \/>\n|       TLS_RSA_WITH_AES_256_CBC_SHA - strong<br \/>\n|     compressors:<br \/>\n|       NULL<br \/>\n|   TLSv1.1:<br \/>\n|     ciphers:<br \/>\n|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong<br \/>\n|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA - strong<br \/>\n|       TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong<br \/>\n|       TLS_RSA_WITH_AES_128_CBC_SHA - strong<br \/>\n|       TLS_RSA_WITH_AES_256_CBC_SHA - strong<br \/>\n|     compressors:<br \/>\n|       NULL<br \/>\n|   TLSv1.2: No supported ciphers found<br \/>\n|_  least strength: strong<\/p>\n<p>Nmap done: 1 IP address (1 host up) scanned in 1.57 seconds<\/p>\n<p>In this case we can see that only TLS v1.1 and TLS v1.0 are supported. No TLSv1.2 and no SSLv3.<\/p>\n<p>Cheers &<br \/>\nBest wishes,<br \/>\nAdam<\/p>\n","protected":false},"excerpt":{"rendered":"<p>So, you may have recently had an audit performed, or have been warned about the dangers of SSLv3, poodle attack, heartbleed and etc. You want to understand exactly which ciphers your using on the Load Balancer, cloud-server, or dedicated server. &hellip; <a href=\"https:\/\/haxed.me.uk\/index.php\/2016\/10\/11\/checking-website-rackspace-load-balancers-supported-ssl-ciphers\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28,22,7,61,3,32,20],"tags":[],"class_list":["post-810","post","type-post","status-publish","format-standard","hentry","category-interweb","category-load-balancers","category-management-tools","category-rackspace","category-security","category-ssl","category-webhosting"],"_links":{"self":[{"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/posts\/810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/comments?post=810"}],"version-history":[{"count":2,"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/posts\/810\/revisions"}],"predecessor-version":[{"id":812,"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/posts\/810\/revisions\/812"}],"wp:attachment":[{"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/media?parent=810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/categories?post=810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/tags?post=810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}