<html><body><p>Hello,<br><br>    This is an older thread now but our mitigation guys found a solution in fixing this that I think you all may want as the output has now changed from the 13 ciphers that would not change to the below.  Its a rather easy fix as well and possible I missed it with assumptions.<br><br>You need to modify both the realm name dse and the pki dse ldifs.  I was only modifying the realm dse.<br><br><br>/etc/dirsrv/slapd-PKI-IPA/dse.ldif<br>/etc/dirsrv/slapd-RELAM-NAME/dse.ldif<br><br><br><br><br>[bob@dingle ~]# nmap --script ssl-enum-ciphers -p 636 `hostname`<br><br>Starting Nmap 5.51 ( <a href="http://nmap.org/">http://nmap.org</a> ) at 2016-05-17 10:59 EDT<br>Nmap scan report for dingle@bob.local (IP of dingle)<br>Host is up (0.00015s latency).<br>PORT    STATE SERVICE<br>636/tcp open  ldapssl<br>| ssl-enum-ciphers: <br>|   TLSv1.2<br>|     Ciphers (7)<br>|       SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA<br>|       TLS_RSA_WITH_3DES_EDE_CBC_SHA<br>|       TLS_RSA_WITH_AES_128_CBC_SHA<br>|       TLS_RSA_WITH_AES_128_CBC_SHA256<br>|       TLS_RSA_WITH_AES_128_GCM_SHA256<br>|       TLS_RSA_WITH_AES_256_CBC_SHA<br>|       TLS_RSA_WITH_AES_256_CBC_SHA256<br>|     Compressors (1)<br>|_      uncompressed<br><br><br><br><br><br>Sean Hogan<br><br><br><br><img width="16" height="16" src="cid:1__=88BBF525DFC1E0578f9e8a93df938690918c88B@" border="0" alt="Inactive hide details for Sean Hogan---04/29/2016 01:49:12 PM---Thanks Rob... appreciate the help.. can you send me what you ha"><font color="#424282">Sean Hogan---04/29/2016 01:49:12 PM---Thanks Rob... appreciate the help.. can you send me what you have in nss.conf, server.xml as well?</font><br><br><font size="2" color="#5F5F5F">From:        </font><font size="2">Sean Hogan/Durham/IBM</font><br><font size="2" color="#5F5F5F">To:        </font><font size="2">Rob Crittenden <rcritten@redhat.com></font><br><font size="2" color="#5F5F5F">Cc:        </font><font size="2">freeipa-users@redhat.com, Noriko Hosoi <nhosoi@redhat.com></font><br><font size="2" color="#5F5F5F">Date:        </font><font size="2">04/29/2016 01:49 PM</font><br><font size="2" color="#5F5F5F">Subject:        </font><font size="2">Re: [Freeipa-users] IPA vulnerability management SSL</font><br><hr width="100%" size="2" align="left" noshade style="color:#8091A5; "><br><br>Thanks Rob... appreciate the help.. can you send me what you have in nss.conf, server.xml as well?  If I start off playing with something you see working without issue then maybe I can come up with something or am I wrong thinking those might affect anything?  <br><br>IE .. can you send me the entire cn=encryption, cn=config section like this<br>dn: cn=encryption,cn=config<br>objectClass: top<br>objectClass: nsEncryptionConfig<br>cn: encryption<br>nsSSLSessionTimeout: 0<br>nsSSLClientAuth: allowed<br>nsSSL2: off<br>nsSSL3: off<br>creatorsName: cn=server,cn=plugins,cn=config<br>modifiersName: cn=directory manager<br>createTimestamp: 20150420131850Z<br>modifyTimestamp: 20150420131906Z<br>nsSSL3Ciphers: -rsa_null_md5,-rsa_rc4_128_sha,-rsa_rc4_128_md5,-rsa_rc4_40_md5<br> ,-rsa_rc2_40_md5,-rsa_des_sha,-rsa_fips_des_sha,+rsa_3des_sha,+rsa_fips_3des_<br> sha,-fortezza,-fortezza_rc4_128_sha,-fortezza_null,-tls_rsa_export1024_with_r<br> c4_56_sha,-tls_rsa_export1024_with_des_cbc_sha<br>numSubordinates: 1<br><br><br>Sean Hogan<br><br><br><br><br><br><br><img width="16" height="16" src="cid:1__=88BBF525DFC1E0578f9e8a93df938690918c88B@" border="0" alt="Inactive hide details for Rob Crittenden ---04/29/2016 01:36:02 PM---Sean Hogan wrote: > Apparently making it the master ca wil"><font color="#424282">Rob Crittenden ---04/29/2016 01:36:02 PM---Sean Hogan wrote: > Apparently making it the master ca will not work at this point since the</font><br><br><font size="2" color="#5F5F5F">From:        </font><font size="2">Rob Crittenden <rcritten@redhat.com></font><br><font size="2" color="#5F5F5F">To:        </font><font size="2">Sean Hogan/Durham/IBM@IBMUS</font><br><font size="2" color="#5F5F5F">Cc:        </font><font size="2">freeipa-users@redhat.com, Noriko Hosoi <nhosoi@redhat.com></font><br><font size="2" color="#5F5F5F">Date:        </font><font size="2">04/29/2016 01:36 PM</font><br><font size="2" color="#5F5F5F">Subject:        </font><font size="2">Re: [Freeipa-users] IPA vulnerability management SSL</font><br><hr width="100%" size="2" align="left" noshade style="color:#8091A5; "><br><br><br><tt>Sean Hogan wrote:<br>> Apparently making it the master ca will not work at this point since the<br>> replica is removed. So still stuck with non-changing ciphers.<br><br>Other services running on the box have zero impact on the ciphers available.<br><br>I'm not sure what is wrong because it took me just a minute to stop <br>dirsrv, modify dse.ldif with the list I provided, restart it and confirm <br>that the cipher list was better.<br><br>Entries in cn=config are not replicated.<br><br>rob<br><br>><br>><br>> Sean Hogan<br>><br>><br>><br>><br>><br>> Inactive hide details for Sean Hogan---04/29/2016 08:56:57 AM---Hi Rob,<br>> I stopped IPA, modified dse.ldif, restarted with the Sean<br>> Hogan---04/29/2016 08:56:57 AM---Hi Rob, I stopped IPA, modified<br>> dse.ldif, restarted with the cipher list and it started without is<br>><br>> From: Sean Hogan/Durham/IBM<br>> To: Rob Crittenden <rcritten@redhat.com><br>> Cc: freeipa-users@redhat.com, Noriko Hosoi <nhosoi@redhat.com><br>> Date: 04/29/2016 08:56 AM<br>> Subject: Re: [Freeipa-users] IPA vulnerability management SSL<br>><br>> ------------------------------------------------------------------------<br>><br>><br>> Hi Rob,<br>><br>> I stopped IPA, modified dse.ldif, restarted with the cipher list and it<br>> started without issue however Same 13 ciphers. You know.. thinking about<br>> this now.. I going to try something. The box I am testing on it a<br>> replica master and not the first replica. I did not think this would<br>> make a difference since I removed the replica from the realm before<br>> testing but maybe it will not change anything thinking its stuck in the<br>> old realm?<br>><br>> Starting Nmap 5.51 ( </tt><tt><a href="http://nmap.org">http://nmap.org</a></tt><tt> <</tt><tt><a href="http://nmap.org/">http://nmap.org/</a></tt><tt>> ) at 2016-04-29<br>> 11:51 EDT<br>> Nmap scan report for<br>> Host is up (0.000082s latency).<br>> PORT STATE SERVICE<br>> 636/tcp open ldapssl<br>> | ssl-enum-ciphers:<br>> | TLSv1.2<br>> | Ciphers (13)<br>> | SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA<br>> | SSL_RSA_FIPS_WITH_DES_CBC_SHA<br>> | TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA<br>> | TLS_RSA_EXPORT1024_WITH_RC4_56_SHA<br>> | TLS_RSA_WITH_3DES_EDE_CBC_SHA<br>> | TLS_RSA_WITH_AES_128_CBC_SHA<br>> | TLS_RSA_WITH_AES_128_CBC_SHA256<br>> | TLS_RSA_WITH_AES_128_GCM_SHA256<br>> | TLS_RSA_WITH_AES_256_CBC_SHA<br>> | TLS_RSA_WITH_AES_256_CBC_SHA256<br>> | TLS_RSA_WITH_DES_CBC_SHA<br>> | TLS_RSA_WITH_RC4_128_MD5<br>> | TLS_RSA_WITH_RC4_128_SHA<br>> | Compressors (1)<br>><br>> dn: cn=encryption,cn=config<br>> objectClass: top<br>> objectClass: nsEncryptionConfig<br>> cn: encryption<br>> nsSSLSessionTimeout: 0<br>> nsSSLClientAuth: allowed<br>> nsSSL2: off<br>> nsSSL3: off<br>> creatorsName: cn=server,cn=plugins,cn=config<br>> modifiersName: cn=directory manager<br>> createTimestamp: 20150420131850Z<br>> modifyTimestamp: 20150420131906Z<br>> nsSSL3Ciphers:<br>> -rsa_null_md5,-rsa_rc4_128_sha,-rsa_rc4_128_md5,-rsa_rc4_40_md5<br>> ,-rsa_rc2_40_md5,-rsa_des_sha,-rsa_fips_des_sha,+rsa_3des_sha,+rsa_fips_3des_<br>> sha,-fortezza,-fortezza_rc4_128_sha,-fortezza_null,-tls_rsa_export1024_with_r<br>> c4_56_sha,-tls_rsa_export1024_with_des_cbc_sha<br>> numSubordinates: 1<br>><br>><br>><br>><br>><br>> Sean Hogan<br><br>> <br>><br>><br>><br>><br>><br>><br>><br>> Inactive hide details for Rob Crittenden ---04/29/2016 08:30:29<br>> AM---Sean Hogan wrote: > Hi Noriko,Rob Crittenden ---04/29/2016 08:30:29<br>> AM---Sean Hogan wrote: > Hi Noriko,<br>><br>> From: Rob Crittenden <rcritten@redhat.com><br>> To: Sean Hogan/Durham/IBM@IBMUS, Noriko Hosoi <nhosoi@redhat.com><br>> Cc: freeipa-users@redhat.com<br>> Date: 04/29/2016 08:30 AM<br>> Subject: Re: [Freeipa-users] IPA vulnerability management SSL<br>> ------------------------------------------------------------------------<br>><br>><br>><br>> Sean Hogan wrote:<br>>  > Hi Noriko,<br>>  ><br>>  > Thanks for the suggestions,<br>>  ><br>>  > I had to trim out the GCM ciphers in order to get IPA to start back up<br>>  > or I would get the unknown cipher message<br>><br>> The trick is getting the cipher name right (it doesn't always follow a<br>> pattern) and explicitly disabling some ciphers as they are enabled by<br>> default.<br>><br>> Try this string:<br>><br>> -rsa_null_md5,-rsa_rc4_128_sha,-rsa_rc4_128_md5,-rsa_rc4_40_md5,-rsa_rc2_40_md5,-rsa_des_sha,-rsa_fips_des_sha,+rsa_3des_sha,+rsa_fips_3des_sha,-fortezza,-fortezza_rc4_128_sha,-fortezza_null,-tls_rsa_export1024_with_rc4_56_sha,-tls_rsa_export1024_with_des_cbc_sha<br>><br>> I have an oldish install but I think it will still do what you need:<br>> 389-ds-base-1.2.11.15-68.el6_7.x86_64<br>><br>> Starting Nmap 7.12 ( </tt><tt><a href="https://nmap.org">https://nmap.org</a></tt><tt> ) at 2016-04-29 11:24 EDT<br>> Nmap scan report for pacer.example.com (192.168.126.2)<br>> Host is up (0.00053s latency).<br>> PORT    STATE SERVICE<br>> 636/tcp open  ldapssl<br>> | ssl-enum-ciphers:<br>> |   TLSv1.2:<br>> |     ciphers:<br>> |       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A<br>> |       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A<br>> |       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A<br>> |       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A<br>> |       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A<br>> |       SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C<br>> |       TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C<br>> |     compressors:<br>> |       NULL<br>> |     cipher preference: server<br>> |_  least strength: C<br>><br>> Nmap done: 1 IP address (1 host up) scanned in 0.19 seconds<br>><br>> $ sslscan pacer.example.com:636 |grep Accept<br>>      Accepted  TLSv1  256 bits  AES256-SHA<br>>      Accepted  TLSv1  128 bits  AES128-SHA<br>>      Accepted  TLSv1  112 bits  DES-CBC3-SHA<br>>      Accepted  TLS11  256 bits  AES256-SHA<br>>      Accepted  TLS11  128 bits  AES128-SHA<br>>      Accepted  TLS11  112 bits  DES-CBC3-SHA<br>>      Accepted  TLS12  256 bits  AES256-SHA256<br>>      Accepted  TLS12  256 bits  AES256-SHA<br>>      Accepted  TLS12  128 bits  AES128-GCM-SHA256<br>>      Accepted  TLS12  128 bits  AES128-SHA256<br>>      Accepted  TLS12  128 bits  AES128-SHA<br>>      Accepted  TLS12  112 bits  DES-CBC3-SHA<br>><br>> rob<br>><br>>  ><br>>  > Nmap is still showing the same 13 ciphers as before though like nothing<br>>  > had changed and I did ipactl stop, made modification, ipactl start<br>>  ><br>>  > tarting Nmap 5.51 ( </tt><tt><a href="http://nmap.org">http://nmap.org</a></tt><tt> <</tt><tt><a href="http://nmap.org/">http://nmap.org/</a></tt><tt>> ) at 2016-04-28<br>>  > 18:44 EDT<br>>  > Nmap scan report for<br>>  > Host is up (0.000053s latency).<br>>  > PORT STATE SERVICE<br>>  > 636/tcp open ldapssl<br>>  > | ssl-enum-ciphers:<br>>  > | TLSv1.2<br>>  > | Ciphers (13)<br>>  > | SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA<br>>  > | SSL_RSA_FIPS_WITH_DES_CBC_SHA<br>>  > | TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA<br>>  > | TLS_RSA_EXPORT1024_WITH_RC4_56_SHA<br>>  > | TLS_RSA_WITH_3DES_EDE_CBC_SHA<br>>  > | TLS_RSA_WITH_AES_128_CBC_SHA<br>>  > | TLS_RSA_WITH_AES_128_CBC_SHA256<br>>  > | TLS_RSA_WITH_AES_128_GCM_SHA256<br>>  > | TLS_RSA_WITH_AES_256_CBC_SHA<br>>  > | TLS_RSA_WITH_AES_256_CBC_SHA256<br>>  > | TLS_RSA_WITH_DES_CBC_SHA<br>>  > | TLS_RSA_WITH_RC4_128_MD5<br>>  > | TLS_RSA_WITH_RC4_128_SHA<br>>  > | Compressors (1)<br>>  > |_ uncompressed<br>>  ><br>>  > Nmap done: 1 IP address (1 host up) scanned in 0.21 seconds<br>>  ><br>>  > Current Config:<br>>  ><br>>  > dse.ldif<br>>  > dn: cn=encryption,cn=config<br>>  > objectClass: top<br>>  > objectClass: nsEncryptionConfig<br>>  > cn: encryption<br>>  > nsSSLSessionTimeout: 0<br>>  > nsSSLClientAuth: allowed<br>>  > nsSSL2: off<br>>  > nsSSL3: off<br>>  > creatorsName: cn=server,cn=plugins,cn=config<br>>  > modifiersName: cn=directory manager<br>>  > createTimestamp: 20150420131850Z<br>>  > modifyTimestamp: 20150420131906Z<br>>  > nsSSL3Ciphers:<br>>  > -rsa_null_md5,-rsa_null_sha,-rsa_null_sha,-rsa_rc4_56_sha,-tls_<br>>  ><br>> rsa_export1024_with_rc4_56_sha,-tls_dhe_dss_1024_rc4_sha,+tls_rsa_aes_128_sha<br>>  ><br>> ,+rsa_aes_128_sha,+tls_dhe_dss_aes_128_sha,+tls_dhe_rsa_aes_128_sha,+tls_rsa_<br>>  > aes_256_sha,+rsa_aes_256_sha<br>>  > numSubordinates: 1<br>>  ><br>>  ><br>>  > nss.conf<br>>  > # SSL 3 ciphers. SSL 2 is disabled by default.<br>>  > NSSCipherSuite<br>>  ><br>> -rsa_null_md5,-rsa_null_sha,-rsa_null_sha,-rsa_rc4_56_sha,-tls_rsa_export1024_with_rc4_56_sha,-tls_dhe_dss_1024_rc4_sha,+tls_rsa_aes_128_sha,+rsa_aes_128_sha,+tls_dhe_dss_aes_128_sha,+tls_dhe_rsa_aes_128_sha,+tls_rsa_aes_256_sha,+rsa_aes_256_sha,+tls_rsa_aes_128_gcm_sha,+tls_dhe_rsa_aes_128_gcm_sha,+tls_dhe_dss_aes_128_gcm_sha<br>>  ><br>>  > NSSProtocol TLSv1.0,TLSv1.1,TLSv1.2<br>>  ><br>>  ><br>>  > Does nss.conf have anything to do with the dir srv ciphers? I know the<br>>  > 389 docs says they are tied together so the way I have been looking at<br>>  > it is nss.conf lists the allowed ciphers where dse.ldif lists which ones<br>>  > to use for 389 from nss.conf. Is that correct? Is there any other place<br>>  > where ciphers would be ignored?<br>>  ><br>>  > nss-3.19.1-8.el6_7.x86_64<br>>  > sssd-ipa-1.12.4-47.el6_7.4.x86_64<br>>  > ipa-client-3.0.0-47.el6_7.1.x86_64<br>>  > ipa-server-selinux-3.0.0-47.el6_7.1.x86_64<br>>  > ipa-pki-common-theme-9.0.3-7.el6.noarch<br>>  > ipa-python-3.0.0-47.el6_7.1.x86_64<br>>  > ipa-server-3.0.0-47.el6_7.1.x86_64<br>>  > libipa_hbac-python-1.12.4-47.el6_7.4.x86_64<br>>  > ipa-admintools-3.0.0-47.el6_7.1.x86_64<br>>  > ipa-pki-ca-theme-9.0.3-7.el6.noarch<br>>  > 389-ds-base-1.2.11.15-68.el6_7.x86_64<br>>  > 389-ds-base-libs-1.2.11.15-68.el6_7.x86_64<br>>  ><br>>  ><br>>  > I need to get rid of any rc4s<br>>  ><br>>  > Sean Hogan<br><br>>  ><br>>  ><br>>  ><br>>  ><br>>  ><br>>  > Inactive hide details for Noriko Hosoi ---04/28/2016 12:08:59 PM---Thank<br>>  > you for including me in the loop, Ludwig. On 04/28/201Noriko Hosoi<br>>  > ---04/28/2016 12:08:59 PM---Thank you for including me in the loop,<br>>  > Ludwig. On 04/28/2016 04:34 AM, Ludwig Krispenz wrote:<br>>  ><br>>  > From: Noriko Hosoi <nhosoi@redhat.com><br>>  > To: Ludwig Krispenz <lkrispen@redhat.com>, freeipa-users@redhat.com<br>>  > Date: 04/28/2016 12:08 PM<br>>  > Subject: Re: [Freeipa-users] IPA vulnerability management SSL<br>>  > Sent by: freeipa-users-bounces@redhat.com<br>>  ><br>>  > ------------------------------------------------------------------------<br>>  ><br>>  ><br>>  ><br>>  > Thank you for including me in the loop, Ludwig.<br>>  ><br>>  > On 04/28/2016 04:34 AM, Ludwig Krispenz wrote:<br>>  >  > If I remember correctly we did the change in default ciphers and the<br>>  > option for handling in 389-ds > 1.3.3, so it would not be in RHEL6,<br>>  > adding Noriko to get confirmation.<br>>  ><br>>  > Ludwig is right.  The way how to set nsSSL3Ciphers has been changed<br>>  > since 1.3.3 which is available on RHEL-7.<br>>  ><br>>  > This is one of the newly supported values of nsSSL3Ciphers:<br>>  ><br>>  >         Notes: if the value contains +all, then *-<cipher>*is removed<br>>  >         from the list._<br>>  ><br>> __http://www.port389.org/docs/389ds/design/nss-cipher-design.html#available-by-setting-all----nss-3162-1_<br>>  ><br>>  > On the older 389-ds-base including 389-ds-base-1.2.11.X on RHEL-6.X, if<br>>  > "+all" is found in the value, all the available ciphers are enabled.<br>>  ><br>>  > To workaround it, could you try explicitely setting ciphers as follows?<br>>  > nsSSL3Ciphers:<br>>  ><br>> -rsa_null_md5,-rsa_null_sha,-rsa_null_sha,-rsa_rc4_56_sha,-tls_rsa_export1024_with_rc4_56_sha,-tls_dhe_dss_1024_rc4_sha,<br>>  ><br>> +tls_rsa_aes_128_sha,+rsa_aes_128_sha,+tls_dhe_dss_aes_128_sha,+tls_dhe_rsa_aes_128_sha,+tls_rsa_aes_256_sha,+rsa_aes_256_sha,<br>>  ><br>> +tls_rsa_aes_128_gcm_sha,+tls_dhe_rsa_aes_128_gcm_sha,+tls_dhe_dss_aes_128_gcm_sha<br>>  ><br>>  > Thanks,<br>>  > --noriko<br>>  ><br>>  > On 04/28/2016 04:34 AM, Ludwig Krispenz wrote:<br>>  ><br>>  >         wanted to add Noriko, but hit send to quickly<br>>  ><br>>  >         On 04/28/2016 01:26 PM, Ludwig Krispenz wrote:<br>>  ><br>>  >                 On 04/28/2016 12:06 PM, Martin Kosek wrote:<br>>  >                         On 04/28/2016 01:23 AM, Sean Hogan wrote:<br>>  >                                 Hi Martin,<br>>  ><br>>  >                                 No joy on placing - in front of the RC4s<br>>  ><br>>  ><br>>  >                                 I modified my nss.conf to now read<br>>  >                                 # SSL 3 ciphers. SSL 2 is disabled by<br>>  >                                 default.<br>>  >                                 NSSCipherSuite<br>>  ><br>> +aes_128_sha_256,+aes_256_sha_256,+ecdhe_ecdsa_aes_128_gcm_sha_256,+ecdhe_ecdsa_aes_128_sha,+ecdhe_ecdsa_aes_256_sha,+ecdhe_rsa_aes_128_gcm_sha_256,+ecdhe_rsa_aes_128_sha,+ecdhe_rsa_aes_256_sha,+rsa_aes_128_gcm_sha_256,+rsa_aes_128_sha,+rsa_aes_256_sha<br>>  ><br>>  ><br>>  >                                 # SSL Protocol:<br>>  >                                 # Cryptographic protocols that provide<br>>  >                                 communication security.<br>>  >                                 # NSS handles the specified protocols as<br>>  >                                 "ranges", and automatically<br>>  >                                 # negotiates the use of the strongest<br>>  >                                 protocol for a connection starting<br>>  >                                 # with the maximum specified protocol<br>>  >                                 and downgrading as necessary to the<br>>  >                                 # minimum specified protocol that can be<br>>  >                                 used between two processes.<br>>  >                                 # Since all protocol ranges are<br>>  >                                 completely inclusive, and no protocol in<br>>  >                                 the<br>>  >                                 NSSProtocol TLSv1.0,TLSv1.1,TLSv1.2<br>>  ><br>>  >                                 dse.ldif<br>>  ><br>>  >                                 dn: cn=encryption,cn=config<br>>  >                                 objectClass: top<br>>  >                                 objectClass: nsEncryptionConfig<br>>  >                                 cn: encryption<br>>  >                                 nsSSLSessionTimeout: 0<br>>  >                                 nsSSLClientAuth: allowed<br>>  >                                 nsSSL2: off<br>>  >                                 nsSSL3: off<br>>  >                                 creatorsName:<br>>  >                                 cn=server,cn=plugins,cn=config<br>>  >                                 modifiersName: cn=directory manager<br>>  >                                 createTimestamp: 20150420131850Z<br>>  >                                 modifyTimestamp: 20150420131906Z<br>>  >                                 nsSSL3Ciphers:<br>>  ><br>> +all,-rsa_null_sha,-rsa_rc4_56_sha,-tls_rsa_export1024_with_rc4<br>>  ><br>>  >                                 _56_sha,-tls_dhe_dss_1024_rc4_sha<br>>  >                                 numSubordinates: 1<br>>  ><br>>  ><br>>  ><br>>  >                                 But I still get this with nmap.. I<br>>  >                                 thought the above would remove<br>>  >                                 -tls_rsa_export1024_with_rc4_56_sha but<br>>  >                                 still showing. Is it the fact that I<br>> am not<br>>  >                                 offering<br>>  >                                 -tls_rsa_export1024_with_rc4_56_sha? If<br>>  >                                 so.. not really understanding<br>>  >                                 where it is coming from cept the +all<br>>  >                                 from DS but the - should be negating<br>> that?<br>>  ><br>>  >                                 Starting Nmap 5.51 ( _http://nmap.org_<br>>  >                                 <</tt><tt><a href="http://nmap.org/">http://nmap.org/</a></tt><tt>>_<</tt><tt><a href="http://nmap.org/">http://nmap.org/</a></tt><tt>>_<br>>  >                                 <</tt><tt><a href="http://nmap.org/">http://nmap.org/</a></tt><tt>>) at 2016-04-27<br>> 17:37 EDT<br>>  >                                 Nmap scan report for<br>>  >                                 Host is up (0.000086s latency).<br>>  >                                 PORT STATE SERVICE<br>>  >                                 636/tcp open ldapssl<br>>  >                                 | ssl-enum-ciphers:<br>>  >                                 | TLSv1.2<br>>  >                                 | Ciphers (13)<br>>  >                                 | SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA<br>>  >                                 | SSL_RSA_FIPS_WITH_DES_CBC_SHA<br>>  >                                 | TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA<br>>  >                                 | TLS_RSA_EXPORT1024_WITH_RC4_56_SHA<br>>  >                                 | TLS_RSA_WITH_3DES_EDE_CBC_SHA<br>>  >                                 | TLS_RSA_WITH_AES_128_CBC_SHA<br>>  >                                 | TLS_RSA_WITH_AES_128_CBC_SHA256<br>>  >                                 | TLS_RSA_WITH_AES_128_GCM_SHA256<br>>  >                                 | TLS_RSA_WITH_AES_256_CBC_SHA<br>>  >                                 | TLS_RSA_WITH_AES_256_CBC_SHA256<br>>  >                                 | TLS_RSA_WITH_DES_CBC_SHA<br>>  >                                 | TLS_RSA_WITH_RC4_128_MD5<br>>  >                                 | TLS_RSA_WITH_RC4_128_SHA<br>>  >                                 | Compressors (1)<br>>  >                                 |_ uncompressed<br>>  ><br>>  >                                 Nmap done: 1 IP address (1 host up)<br>>  >                                 scanned in 0.32 seconds<br>>  ><br>>  ><br>>  ><br>>  >                                 It seems no matter what config I put<br>>  >                                 into nss.conf or dse.ldif nothing changes<br>>  >                                 with my nmap results. Is there supposed<br>>  >                                 to be a be a section to add TLS ciphers<br>>  >                                 instead of SSL Not sure now, CCing<br>> Ludwig who was involved in<br>>  >                         the original RHEL-6<br>>  >                         implementation. If I remember correctly we<br>> did the change in default<br>>  >                 ciphers and the option for handling in 389-ds > 1.3.3,<br>>  >                 so it would not be in RHEL6, adding Noriko to get<br>>  >                 confirmation.<br>>  ><br>>  >                 but the below comments about changing ciphers in<br>>  >                 dse.ldif could help in using the "old" way to set ciphers<br>>  >                         Just to be sure, when you are modifying<br>>  >                         dse.ldif, the procedure<br>>  >                         should be always following:<br>>  ><br>>  >                         1) Stop Directory Server service<br>>  >                         2) Modify dse.ldif<br>>  >                         3) Start Directory Server service<br>>  ><br>>  >                         Otherwise it won't get applied and will get<br>>  >                         overwritten later.<br>>  ><br>>  >                         In any case, the ciphers with RHEL-6 should be<br>>  >                         secure enough, the ones in<br>>  >                         FreeIPA 4.3.1 should be even better. This is for<br>>  >                         example an nmap taken on<br>>  >                         FreeIPA Demo instance that runs on FreeIPA 4.3.1:<br>>  ><br>>  >                         $ nmap --script ssl-enum-ciphers -p 636<br>>  >                         ipa.demo1.freeipa.org<br>>  ><br>>  >                         Starting Nmap 7.12 ( _https://nmap.org_<br>>  >                         <</tt><tt><a href="https://nmap.org/">https://nmap.org/</a></tt><tt>>) at 2016-04-28 12:02 CEST<br>>  >                         Nmap scan report for ipa.demo1.freeipa.org<br>>  >                         (209.132.178.99)<br>>  >                         Host is up (0.18s latency).<br>>  >                         PORT    STATE SERVICE<br>>  >                         636/tcp open  ldapssl<br>>  >                         | ssl-enum-ciphers:<br>>  >                         |   TLSv1.2:<br>>  >                         |     ciphers:<br>>  >                         |       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256<br>>  >                         (secp256r1) - A<br>>  >                         |       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA<br>>  >                         (secp256r1) - A<br>>  >                         |       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256<br>>  >                         (secp256r1) - A<br>>  >                         |       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA<br>>  >                         (secp256r1) - A<br>>  >                         |       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh<br>>  >                         2048) - A<br>>  >                         |       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh<br>>  >                         2048) - A<br>>  >                         |       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh<br>>  >                         2048) - A<br>>  >                         |       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh<br>>  >                         2048) - A<br>>  >                         |       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh<br>>  >                         2048) - A<br>>  >                         |       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa<br>>  >                         2048) - A<br>>  >                         |       TLS_RSA_WITH_AES_128_CBC_SHA (rsa<br>> 2048) - A<br>>  >                         |       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa<br>>  >                         2048) - A<br>>  >                         |       TLS_RSA_WITH_AES_256_CBC_SHA (rsa<br>> 2048) - A<br>>  >                         |       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa<br>>  >                         2048) - A<br>>  >                         |     compressors:<br>>  >                         |       NULL<br>>  >                         |     cipher preference: server<br>>  >                         |_  least strength: A<br>>  ><br>>  >                         Nmap done: 1 IP address (1 host up) scanned in<br>>  >                         21.12 seconds<br>>  ><br>>  >                         Martin<br>>  ><br>>  > --<br>>  > Manage your subscription for the Freeipa-users mailing list:<br>>  > </tt><tt><a href="ht
tps://www.redhat.com/mailman/listinfo/freeipa-users">https://www.redhat.com/mailman/listinfo/freeipa-users</a></tt><tt><br>>  > Go to </tt><tt><a href="http://freeipa.org">http://freeipa.org</a></tt><tt> for more info on the project<br>>  ><br>>  ><br>>  ><br>>  ><br>><br>><br>><br>><br>><br><br></tt><br><br><br><BR>
</body></html>