THE INFORMATION IN THIS ARTICLE APPLIES TO:
SYMPTOM
Security Audit report states weak ciphers are enabled.
CAUSE
The EFT server administrator has complete control over which ciphers to enable or disable. In this case, weak ciphers are enabled.
In EFT v8.0 and later, TLS v1.2 is set by default.
RESOLUTION/WORKAROUND
To ensure only strong ciphers are being used
-
In the administration interface, connect
to EFT and click the Server tab.
-
On the Server
tab, click the server node that you want to configure.
-
In the right pane, click the Security
tab.
-
In the SSL Compatibility
area, specify the SSL versions/ciphers to use.
-
Select the check box of one or more ciphers/algorithms
to use, or manually specify the ciphers. At least one cipher must
be specified.
-
Click the arrows to arrange the ciphers in top-down
priority. If more than one approved cipher is specified, and the connecting
client has in its list one or more ciphers that are also on EFT’s
approved list, EFT will select and use the cipher based on ordering
(priority) shown in the list box.
-
Click Apply
to save the changes to EFT.
For more information, refer to "Enabling SSL on the Server" in the help for your version of EFT.