A site for solving at least some of your technical problems...
A site for solving at least some of your technical problems...
If you are using Apache and e-Commerce, you probably want to know all the details of the ciphers used by the Apache SSL module.
So listing Apache supported ciphers is done using nmap as follow:
nmap --script ssl-cert,ssl-enum-ciphers -p 443 secure.m2osw.com
This call gives you a complete list of all the ciphers currently accepted by your running version of Apache. For example, the list may look like this:
| ssl-enum-ciphers: | SSLv3: | ciphers: | TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA - strong | TLS_DHE_RSA_WITH_AES_128_CBC_SHA - strong | TLS_DHE_RSA_WITH_AES_256_CBC_SHA - strong | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA - strong | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA - strong | TLS_DHE_RSA_WITH_SEED_CBC_SHA - strong | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA - strong | TLS_ECDHE_RSA_WITH_RC4_128_SHA - strong | TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong | TLS_RSA_WITH_AES_128_CBC_SHA - strong | TLS_RSA_WITH_AES_256_CBC_SHA - strong | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA - strong | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA - strong | TLS_RSA_WITH_RC4_128_SHA - strong | TLS_RSA_WITH_SEED_CBC_SHA - strong
Here you can see what is being used on the server. Frankly, anything else than "strong" should never appear if you have an e-Commerce system.
Source: Testing for Weak SSL/TSL Ciphers
Recent Posts on The Linux Page: