SAP Knowledge Base Article - Preview

2651148 - How to restrict the protocols and ciphers available to an SSL connection - SAP SDK

Symptom

sslscan tool report that repserver 15.7 SP306 accepts connections using TLS 1.0 and 1.1 as well as the preferred TLS1.2.
Furthermore it also accepts illegal ciphers such as NULL-MD5:

Supported Server Cipher(s):
Preferred TLSv1.2 256 bits AES256-GCM-SHA384
Accepted TLSv1.2 256 bits AES256-SHA
Accepted TLSv1.2 128 bits AES128-GCM-SHA256
Accepted TLSv1.2 128 bits AES128-SHA
Accepted TLSv1.2 0 bits NULL-MD5
Preferred TLSv1.1 256 bits AES256-SHA
Accepted TLSv1.1 128 bits AES128-SHA
Accepted TLSv1.1 0 bits NULL-MD5
Preferred TLSv1.0 256 bits AES256-SHA
Accepted TLSv1.0 128 bits AES128-SHA
Accepted TLSv1.0 0 bits NULL-MD5


Read more...

Environment

  • SAP Sybase Software Developer Kit (SDK) 15.7
  • SAP Replication Server (SRS) Software Developer Kit (SDK) 16.0  
  • Open Client Client-Library

   

Product

SAP Adaptive Server Enterprise SDK 16.0 ; Sybase SDK 12.5 ; Sybase SDK 15.0 ; Sybase SDK 15.5 ; Sybase SDK 15.7 ; Sybase Software Developer Kit 15.7

Keywords

CR#815245, CR815245, 815245, ciphers, SSL, NULL-MD5 , KBA , BC-SYB-SDK , SDK , How To

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.