Disabling weak ciphers using port 1813 in RSA Authentication Manager 8.3 patch 1
Originally Published: 2018-08-07
Article Number
Applies To
of the SSL/TLS protocols that support cipher suites which use 3DES as the symmetric encryption cipher are affected. The security of a
block cipher is often reduced to the key size k: the best attack should be the exhaustive search of the key, with complexity 2 to the
power of k. However, the block size n is also an important security parameter, defining the amount of data that can be encrypted under
the same key. This is particularly important when using common modes of operation: we require block ciphers to be secure with up to 2
to the power of n queries, but most modes of operation (e.g. CBC, CTR, GCM, OCB, etc.) are unsafe with more than 2 to the power of
half n blocks of message (the birthday bound). With a modern block cipher with 128-bit blocks such as AES, the birthday bound
corresponds to 256 exabytes. However, for a block cipher with 64-bit blocks, the birthday bound corresponds to only 32 GB, which is
easily reached in practice. Once a collision between two cipher blocks occurs it is possible to use the collision to extract the plain text
data.
Affected Nodes:
Affected Nodes: Additional Information:
10.216.34.117:1813
(cho2x9aa01.corp.transunion.com)
Negotiated with the following insecure cipher suites: TLS 1.2 ciphers:
TLS_RSA_WITH_3DES_EDE_CBC_SHA
TLS/SSL Server Supports RC4 Cipher Algorithms (CVE-2013-2566) (rc4-cve-2013-2566)
Description:
Recent cryptanalysis results exploit biases in the RC4 keystream to recover repeatedly encrypted plaintexts. As a result, RC4 can no
longer be seen as providing a sufficient level of security for SSL/TLS sessions. It has many single-byte biases, which makes it easier for
remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the
same plaintext.
Affected Nodes:
Affected Nodes: Additional Information:
10.216.34.117:1813
(cho2x9aa01.corp.transunion.com)
Negotiated with the following insecure cipher suites: TLS 1.2 ciphers:
TLS_RSA_WITH_RC4_128_MD5TLS_RSA_WITH_RC4_128_SHA
TLS/SSL Server Supports RC4 Cipher Algorithms (CVE-2013-2566) (rc4-cve-2013-2566)
Description:
Recent cryptanalysis results exploit biases in the RC4 keystream to recover repeatedly encrypted plaintexts. As a result, RC4 can no
longer be seen as providing a sufficient level of security for SSL/TLS sessions. It has many single-byte biases, which makes it easier for
remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the
same plaintext.
Affected Nodes:
Affected Nodes: Additional Information:
10.216.34.117:1813
(cho2x9aa01.corp.transunion.com)
Negotiated with the following insecure cipher suites: TLS 1.2 ciphers:
TLS_RSA_WITH_RC4_128_MD5TLS_RSA_WITH_RC4_128_SHA
TLS/SSL Server Supports The Use of Static Key Ciphers (ssl-static-key-ciphers)
Description:
The server is configured to support ciphers known as static key ciphers. These ciphers don't support "Forward Secrecy". In the new
specification for HTTP/2, these ciphers have been blacklisted.
Affected Nodes:
Affected Nodes: Additional Information:
10.216.34.117:443
(cho2x9aa01.corp.transunion.com)
Negotiated with the following insecure cipher suites: TLS 1.2 ciphers:
TLS_RSA_WITH_AES_256_GCM_SHA384
10.216.34.117:1813
(cho2x9aa01.corp.transunion.com)
Negotiated with the following insecure cipher suites: TLS 1.2 ciphers:
TLS_DH_anon_WITH_AES_128_CBC_SHA256
TLS_DH_anon_WITH_AES_128_GCM_SHA256
TLS_DH_anon_WITH_AES_256_CBC_SHA
TLS_DH_anon_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA
TLS/SSL Server Supports 3DES Cipher Suite (ssl-3des-ciphers)
Description:
Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346) include cipher suites based on the 3DES (Triple Data
Encryption Standard) algorithm. Since 3DES only provides an effective security of 112 bits, it is considered close to end of life by some
agencies. Consequently, the 3DES algorithm is not included in the specifications for TLS version 1.3. ECRYPT II (from 2012)
recommends for generic application independent long-term protection at least 128 bits security. The same recommendation has also
been reported by BSI Germany (from 2015) and ANSSI France (from 2014), 128 bit is the recommended symmetric size and should be
mandatory after 2020. While NIST (from 2012) still considers 3DES being appropriate to use until the end of 2030.
Affected Nodes:
Affected Nodes: Additional Information:
10.216.34.117:1813
(cho2x9aa01.corp.transunion.com)
Negotiated with the following insecure cipher suites: TLS 1.2 ciphers:
TLS_RSA_WITH_3DES_EDE_CBC_SHA
CVE Identifier(s)
Article Summary
Resolution
- Launch an SSH client, such as PuTTy.
- Login to the primary Authentication Manager server as rsaadmin and enter the operating system password.
Note that during Quick Setup another user name may have been selected. Use that user name to login.
- Navigate to /opt/rsa/am/radius and list the file:
# cd /opt/rsa/am/radius # ls -al sbr_administration.xml -rw-r----- 1 rsaadmin rsaadmin 11775 Apr 18 2017 sbr_administration.xml
- Rename the existing file
# mv sbr_administration.xml sbr_administration.orig
- Copy the sbr_administration.xml file obtained from RSA Support to /opt/rsa/am/radius using WinSCP or another secure copy client.
- Restart the RADIUS service
# cd /opt/rsa/am/server ./rsaserv restart radius
- Repeat steps 1 through 6 on each replica, doing the process on only one at a time.
Disclaimer
Related Articles
Identity Management and Governance: No available certificate or key corresponds to the SSL cipher suites which are enabled. 42Number of Views How to disable weaker DHE cipher modes (Logjam) in RSA DLP? 121Number of Views Key Manager Appliance - iDRAC 6 v2.90 - Multiple Weak Encryption Ciphers Enabled 52Number of Views UI not reachable on port 443 in RSA Governance & Lifecyle Virtual Application 117Number of Views Checking the SSL ciphers suites used by RSA Authentication Manager 8.2-8.7 SP2 71Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.9 Release Notes (January 2026) An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide
Don't see what you're looking for?