SSL Certificate Signed using Weak Hashing Algorithm

SSL Certificate Signed using Weak Hashing Algorithm
Troubleshooting

Problem
Nessus scanner reports an issue: The SSL certificate has been signed using a weak hash algorithm.

Symptom
Issue:
SSL Certificate Signed using Weak Hashing Algorithm

Synopsis :

The SSL certificate has been signed using a weak hash algorithm.

Description :

The remote service uses an SSL certificate that has been signed using a cryptographically weak hashing algorithm - MD2, MD4, or MD5. These signature algorithms are known to be vulnerable to collision attacks.
In theory, a determined attacker may be able to leverage this weakness to generate another certificate with the same digital signature, which could allow him to masquerade as the affected service.

Cause
The embedded WebSphere Application Server (eWAS) serves an SSL certificate that is hashed by MD5 which is vulnerable to a collision attack.

Resolving The Problem
To resolve this issue, generate your own self-signed certificates:

  1. Make a backup copy of the original SSL certificate file:

TWA_Home/eWAS/profiles/TIPProfile/etc/TWSServerKeyFile.jks

  1. Run the executable script ikeyman.sh found in:

TWA_Home/eWAS/bin

  1. Load the file TWSServerKeyFile.jks found in:

TWA_Home/eWAS/profiles/TIPProfile/etc/

When prompted for a password enter the word: default

  1. Delete the server certificate.

  2. Create new server certificate by selecting: New Self-Signed

  3. Fill in the requested information. Use SHA-2 as the hashing algorithm.

  4. Save as a JKS file with the filename:

TWA_Home/eWAS/profiles/TIPProfile/etc/TWSServerKeyFile.jks

  1. Restart eWAS

Product Alias/Synonym
Maestro
TWS
TWA

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值