Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feat: TLS and SRTP to choose specific ciphers #385

Open
vdharashive opened this issue Oct 23, 2024 · 2 comments
Open

Feat: TLS and SRTP to choose specific ciphers #385

vdharashive opened this issue Oct 23, 2024 · 2 comments

Comments

@vdharashive
Copy link

Both TLS and SRTP needs to be configured to choose specific ciphers for secure communication

@vdharashive
Copy link
Author

@davehorton is this supported in any way ? or this need to be developed

@vdharashive
Copy link
Author

vdharashive commented Dec 13, 2024

Option to disable ssl-disable-3des-ciphers

CVE

Risk

Host

Port

Name

Synopsis

Description

CVE-2016-2183

High

5061

SSL Medium Strength Cipher Suites Supported (SWEET32)

The remote service supports the use of medium strength SSL ciphers.

The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite.

Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same physical network.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant