Symptom
sslscan tool report that repserver 15.7 SP306 accepts connections using TLS 1.0 and 1.1 as well as the preferred TLS1.2.
Furthermore it also accepts illegal ciphers such as NULL-MD5:
Supported Server Cipher(s):
Preferred TLSv1.2 256 bits AES256-GCM-SHA384
Accepted TLSv1.2 256 bits AES256-SHA
Accepted TLSv1.2 128 bits AES128-GCM-SHA256
Accepted TLSv1.2 128 bits AES128-SHA
Accepted TLSv1.2 0 bits NULL-MD5
Preferred TLSv1.1 256 bits AES256-SHA
Accepted TLSv1.1 128 bits AES128-SHA
Accepted TLSv1.1 0 bits NULL-MD5
Preferred TLSv1.0 256 bits AES256-SHA
Accepted TLSv1.0 128 bits AES128-SHA
Accepted TLSv1.0 0 bits NULL-MD5
Read more...
Environment
- SAP Sybase Software Developer Kit (SDK) 15.7
- SAP Replication Server (SRS) Software Developer Kit (SDK) 16.0
- Open Client Client-Library
Product
Keywords
CR#815245, CR815245, 815245, ciphers, SSL, NULL-MD5 , KBA , BC-SYB-SDK , SDK , How To
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.