-
Notifications
You must be signed in to change notification settings - Fork 198
CBC Ciphers should be disabled by default. #308
Comments
Hi @salderma, thanks for discovering this. ansible-ssh-hardening/defaults/main.yml Lines 213 to 224 in 6626617
On my test machine, this evaluates to:
Maybe there is a problem with the playbook on you test server. |
It must be a CentOS 8 thing... Apparently this would resolve - https://access.redhat.com/solutions/4410591 Sorry, I'll close the issue. |
oh, don't be sorry! I think you fund something, that we missed. |
Fixed by #309 |
Describe the bug
After applying this role and executing a Nessus Scan of the system, SSH is still allowing CBC Ciphers.
https://www.tenable.com/plugins/nessus/70658
Expected behavior
SSL Labs, for example, will render an 'F' grade on a site with CBC ciphers enabled for SSL. (https://blog.qualys.com/technology/2019/04/22/zombie-poodle-and-goldendoodle-vulnerabilities)
I would expect that CBC ciphers should by default be unavailable, and force the user to OPT in with the
ssl_ciphers
variable to enable CBC ciphers.In addition, DISA STIG and NIST National Checklist Program (openscap, scap security guide) require disabling of CBC ciphers for compliance.
The text was updated successfully, but these errors were encountered: