NShiftKey-Rule-Guide logo NShiftKey-Rule-Guide

1. Vulnerability Description

2. How to check vulnerability

$ openssl s_client -connect 서버:443 -ssl2 (-ssl2 option may not be supported) 
$ openssl s_client -connect 서버:443 -ssl3

3. Vulnerability Countermeasure

1) In case of INTERNET INFORMATION SERVICES (IIS)

Store protocol information after Microsoft Windows NT Server:

HKey_Local_Machine\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols registry key. 
This key includes subkeys for 1.0, SSL 2.0, SSL 3.0 와 TLS 1.0. If you create a new DWORD value with the value of “00 00 00 00” in the server subkey to block the protocol, all these protocols can be disabled.

2) In case of APACHE HTTP SERVER

3) In case of NGINX SERVER

ssl_protocols TLSv1.2; 
sudo service nginx restart; // restart service (when running in Linux) 

4) In case of TOMCAT

< Connector port=""8443"" protocol=""org.apache.coyote.http11.Http11Protocol"" 

maxThreads=""150"" SSLEnabled=""true"" scheme=""https"" secure=""true"" 

clientAuth=""false"" sslProtocol=""TLS""/> 

4. Node

SSL/TLS Usage Recommendations (as of December 2019)

image