Le 03/04/2014 17:14, Christina Fu a écrit :
> Did you try turning on the strictCiphers and FIPS mode?
>
>
https://access.redhat.com/site/documentation/en-US/Red_Hat_Certificate_Sy...
>
>
> Search for the word "strictCiphers" and follow the instruction there. 
> For nss softtoken you just need to do steps 14, 15, and 16. Stop 
> server before you begin and start after you are done.
>
> hope this helps,
> Christina
>
> On 04/03/2014 08:02 AM, Thibaut Pouzet wrote:
>> Hi,
>>
>> I am currently using pki-ca v9.0.3-32 with FreeIPA v3.0.0.-37 on a 
>> CentOS 6.5 machine. I am scanning my internal networks in order to 
>> find vulnerabilities, and trying to fix anything I find. I have 
>> found that the HTTPS pki-ca administration interfaces listening on 
>> ports 9444 and 9445 were accepting what might be considered as weak 
>> ciphers (RC4) for data encryption.
>>
>> I removed those ciphers from /etc/pki-ca/server.xml, and then 
>> restarded the daemon, but this had no effects whatsoever on the 
>> ciphers availables on these SSL ports. I searched a bit around 
>> /etc/pki-ca/ and /var/lib/pki-ca/ but could not find where to make 
>> my changes in order to disable RC4 ciphers for those administration 
>> interfaces.
>>
>> I also searched on the Internet & asked on the IRC channel about 
>> this issue, with no succes, so here I am. Has anyone already found a 
>> way to do this ?
>>
>> Regards,
>>
>
> _______________________________________________
> Pki-users mailing list
> Pki-users(a)redhat.com
> 
https://www.redhat.com/mailman/listinfo/pki-users
>
 Hi Christina,
 I just did the things listed in the documentation you gave me0, the 
 only effect it had were that SSLv3 related ciphers were disabled. I 
 still have the TLSv1 ciphers using RC4 available obviously
 
Is it possible in the file /etc/pki-ca/server.xml
there is till a trace of +SSL3_RSA_WITH_RC4_128_SHA for
ssl3Ciphers
tls3Ciphers
?
Thanks,
M.