EcoStruxure IT forum
Schneider Electric support forum about installation and configuration for DCIM including EcoStruxure IT Expert, IT Advisor, Data Center Expert, and NetBotz
Link copied. Please paste this link to share this article on your social media post.
Posted: 2020-07-02 06:18 PM . Last Modified: 2024-04-09 02:01 AM
Preview:
- one of the biggest national banks in our country has the DCO running in an virtual server and the DCE in a physical console
- Our customer used a third part utility to detect vulnerabilities. They use “McAfee Vulnerability Manager 7.5”
- The DCO is running in version 7.5
Vulnerabilities:
The customer is using the McaFee utility require eliminating these 3 vulnerabilities:
- CVE-2014-3566 (SSL v3 information disclosure vulnerability)
- CVE-2015-4000 (TLS diffie-Hellman Key exchange logjam vulnerability)
- CVE-2015-2808 (TLS/SSL RC4 cipher suites information disclosure vulnerability)
Customer requirements:
- Thecustomer only accepted security protocol “TLS version 1.2” in all the communication protocols. This is mandatory in the client console - Server - webmin - applications.
- The customer must disable in the application (DCO) “ALL” the previous security protocols (SSL v2 / SSL v3 / TLS 1.0 / TLS 1.1). All of them must be disabled or deleted in the communication protocols between client – webmin – server .
Remarks:
- The DCO has the setup option to manage the SSL setting. If the customer disables the SSL protocol in the setup option, the DCO is accessible using the http:/ with port 80 and this option is completely prohibited by the IT department.
The customer requires get access to the DCO using web security connection “https:” with port 443, also with the communication protocol TLS 1.2 in both consoles client and server. (it is mandatory!).
Question:
What is the setup in the DCO / Server (console) to get access mandatory with the communication protocol TLS 1.2? This means, the previous protocols (SSL v2 / SSL v3 / TLS 1.0 / TLS 1.1) must be disable in the DCO console and only enable TLS 1.2…
(CID:105457052)
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2020-07-02 06:18 PM . Last Modified: 2024-04-09 02:01 AM
Limiting the number of open ports and improving security are two of the main goals of DCO 8.0
Until DCO 8.0 is released, you can see a list of ports used by DCO 7.5 at StruxureWare Data Center Operation Network Firewall Port Details.
Known vulnerabilities (and actions) are listed at StruxureWare Data Center Operation Software Vulnerability Scanning Results.
I'm not sure whether or not we support the exact SSL/TLS configuration you want in DCO 7.5 but I will ping someone that can verify it.
Update 2015-12-04 09:05: DCO 7.5 does not support TLS 1.2.
(CID:105457097)
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2020-07-02 06:18 PM . Last Modified: 2024-04-09 02:01 AM
Hi Martin!!, I have found an APC information (see link: http://www.schneider-electric.us/sites/us/en/support/faq/faq_main.page?page=content&country=US〈=en&i... ) that explains us that after DCO revision 7.4.1 the vulnerability with name "Poodle" - CVE-2014-3566 was fixed with a patch. Do you know what was the Schneider solution to resolve this vulnerability? If Schneider did not use TLS to resolve the issue, what was the SE solution?...
(CID:105457248)
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2020-07-02 06:18 PM . Last Modified: 2024-04-09 02:01 AM
The package base was updated to include patched versions of the affected components. Additionally, in the default configuration, the server rejects SSLv2 and SSLv3 connections. DCO 7.5 supports TLS 1.0.
(CID:105457290)
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2020-07-02 06:18 PM . Last Modified: 2024-04-09 02:00 AM
Luis Lopez Borbon POODLE exploits a bug in TLS which enabled a man-in-the-middle to downgrade a connection to SSLv3. But it requires the server to support SSLv3. So the POODLE patch for DCO disables SSLv3.
(CID:105457337)
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2020-07-02 06:18 PM . Last Modified: 2024-04-09 02:00 AM
If I disable the SSL in the DCO user interface, the DCO is accessible using a not secure communication between server and client, this means: use http and port 80. This is completely unacceptable for my customer. How can I do??? thanks!
(CID:105457371)
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2020-07-02 06:19 PM . Last Modified: 2024-04-09 02:00 AM
Martin Kamp Jensen If DCO supports TLS 1.0, how can I enable TLS 1.0 in DCO?? I know how and where to disable SSL protocol but I don’t know where can I enable the TLS protocol. My customer requires getting access to the DCO server only using TLS (SSL must be disabled, it is mandatory!)..please help!
(CID:105457372)
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2020-07-02 06:19 PM . Last Modified: 2024-04-09 02:00 AM
DCO 7.5 supports and uses TLS 1.0 while SSLv2 and SSLv3 are already disabled out-of-the-box. You do not need to perform any steps to secure DCO 7.5 against "Poodle". We are aware of DCO 7.5 requiring too many open ports (e.g. port 80 and other ports between cluster nodes as per the link I provided in the original answer). This will be handled in DCO 8.0. Unfortunately, we do support limiting the open ports in DCO 7.5.
(CID:105457507)
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2020-07-02 06:19 PM . Last Modified: 2024-04-09 02:00 AM
Hi Martin,
Please assist.
We have this vulnerability error - "openssl multiple ssl_mode_release_buffers Denial of service vulnerabilities" ( SSL/TLS MITM vulnerability (CVE-2014-0224)
We are running DCO v8.0.2 and I am told this version has a built in fix for this specific vulnerability.
From research, this vulnerability only occurs when its enabled, may I disable "openssl multiple ssl_mode_release_buffers? and if so, what is the impact, also how do I go about this ?
Any help is greatly appreciated!
Kind regards
(CID:122688657)
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2020-07-02 06:19 PM . Last Modified: 2024-04-09 02:00 AM
Hi juice
I'm curios as to learn how you detect this vulnerability. What tool are you using?
The CVE-2014-0224 vulnerability is fixed in DCO 8.0.2 – you can verify this in several ways – the easiest way is to log into the server and:
Run the command:
rpm -qa openssl
Result:
openssl-1.0.1e-42.el7_1.9.x86_64
This lists the version of Openssl we are using.
Run the command:
rpm -q --changelog openssl
Result (a list of all fixes in this version of openssl)
* Tue Jun 23 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-42.9
- fix the CVE-2015-1791 fix (broken server side renegotiation)
* Tue Jun 03 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-34.3
- fix CVE-2010-5298 - possible use of memory after free
- fix CVE-2014-0195 - buffer overflow via invalid DTLS fragment
- fix CVE-2014-0198 - possible NULL pointer dereference
- fix CVE-2014-0221 - DoS from invalid DTLS handshake packet
- fix CVE-2014-0224 - SSL/TLS MITM vulnerability
- fix CVE-2014-3470 - client-side DoS when using anonymous ECDH
As you can see this issue is fixed in the version of openSSL we use in DCO 8.0.2
Best Regards
Anders
(CID:122693386)
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2020-07-02 06:19 PM . Last Modified: 2024-04-09 02:00 AM
Hi Anders
Thank you very much for you effort in making me understand - much appreciated.
Our security team uses McAfee Vulnerability Manager which basically identifies possible threats to the network in terms of firewall and intrusions.
I will give it ago and if necessary will consult our local agent.
much appreciated.
(CID:123340498)
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2020-07-02 06:19 PM . Last Modified: 2023-10-31 10:52 PM
This question is closed for comments. You're welcome to start a new topic if you have further comments on this issue.
Link copied. Please paste this link to share this article on your social media post.
Create your free account or log in to subscribe to the board - and gain access to more than 10,000+ support articles along with insights from experts and peers.