Weakened-Encryption-Protocol/EN

Aus Siwecos
Version vom 7. Mai 2020, 10:41 Uhr von Siwebot (Diskussion | Beiträge)
(Unterschied) ← Nächstältere Version | Aktuelle Version (Unterschied) | Nächstjüngere Version → (Unterschied)
Wechseln zu: Navigation, Suche

Check for weak encryption functions

If the result is positive, there is no need for further action. If the result is negative, please read the following instructions.

Result positive Weak EXPORT encryption not supported
Result negativ Weak EXPORT encryption supported
Description Your web server/website is configured to use intentionally insecure encryption methods. This allows to decrypt communication with your server using Man-in-the-middle attacks.
Background The term cipher suite stands for a collection of cryptographic methods. This collection contains the key exchange method, the signature method, the encryption, and cryptographic hash functions. This combination of cryptographic components ensures that there is a secure connection for the communication between two parties, for example your browser and a web server or website. In the TLS protocol (Transport Layer Security), the cipher suite determines which algorithms are used to establish a secure data connection, and it ensures that the connection is secure.
Consequence Attackers can use a weak encryption method to decode communication between your Web page and the browser of your customer without any problems. It can be used, for example, to read passwords, form data or credit card information and misuse them for criminal purposes. This make possible Man-in-the-middle attacks.
Solution/Tips If Weak EXPORT encryption supported was reported, deactivate support for EXPORT encryption methods on the web server.