<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Which  weak cipher suites for SSL/TLS to delete in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/which-weak-cipher-suites-for-ssl-tls-to-delete/m-p/542850#M111179</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;I recently had a pen test return the following results:&lt;/P&gt;
&lt;TABLE class="reportTable"&gt;
&lt;TBODY class="cipher1Block"&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;SPAN class="color-green"&gt;TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (&lt;CODE&gt;0xc030&lt;/CODE&gt;)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="greySmall"&gt;ECDH secp256r1 (eq. 3072 bits RSA) &amp;nbsp; FS&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;256&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;SPAN class="color-green"&gt;TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (&lt;CODE&gt;0xc02f&lt;/CODE&gt;)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="greySmall"&gt;ECDH secp256r1 (eq. 3072 bits RSA) &amp;nbsp; FS&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;128&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;FONT color="#F88017"&gt;TLS_RSA_WITH_AES_256_GCM_SHA384 (&lt;CODE&gt;0x9d&lt;/CODE&gt;) &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;WEAK&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;&lt;FONT color="#F88017"&gt;256&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;FONT color="#F88017"&gt;TLS_RSA_WITH_AES_128_GCM_SHA256 (&lt;CODE&gt;0x9c&lt;/CODE&gt;) &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;WEAK&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;&lt;FONT color="#F88017"&gt;128&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;FONT color="#F88017"&gt;TLS_RSA_WITH_AES_256_CBC_SHA256 (&lt;CODE&gt;0x3d&lt;/CODE&gt;) &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;WEAK&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;&lt;FONT color="#F88017"&gt;256&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;FONT color="#F88017"&gt;TLS_RSA_WITH_AES_128_CBC_SHA256 (&lt;CODE&gt;0x3c&lt;/CODE&gt;) &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;WEAK&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;&lt;FONT color="#F88017"&gt;128&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;SPAN class="color-green"&gt;TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (&lt;CODE&gt;0x9f&lt;/CODE&gt;)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="greySmall"&gt;&lt;SPAN title="p: 256, g: 256, Ys: 256"&gt;DH 2048 bits&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp; FS&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;256&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;SPAN class="color-green"&gt;TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (&lt;CODE&gt;0x9e&lt;/CODE&gt;)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="greySmall"&gt;&lt;SPAN title="p: 256, g: 256, Ys: 256"&gt;DH 2048 bits&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp; FS&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;128&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;FONT color="#F88017"&gt;TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (&lt;CODE&gt;0xc014&lt;/CODE&gt;) &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="greySmall"&gt;ECDH secp256r1 (eq. 3072 bits RSA) &amp;nbsp; FS&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;WEAK&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;&lt;FONT color="#F88017"&gt;256&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;FONT color="#F88017"&gt;TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (&lt;CODE&gt;0xc013&lt;/CODE&gt;) &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="greySmall"&gt;ECDH secp256r1 (eq. 3072 bits RSA) &amp;nbsp; FS&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;WEAK&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;&lt;FONT color="#F88017"&gt;128&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;FONT color="#F88017"&gt;TLS_RSA_WITH_AES_128_CBC_SHA (&lt;CODE&gt;0x2f&lt;/CODE&gt;) &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;WEAK&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;&lt;FONT color="#F88017"&gt;128&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;FONT color="#F88017"&gt;TLS_DHE_RSA_WITH_AES_256_CBC_SHA (&lt;CODE&gt;0x39&lt;/CODE&gt;) &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="greySmall"&gt;&lt;SPAN title="p: 256, g: 256, Ys: 256"&gt;DH 2048 bits&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp; FS&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;WEAK&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;&lt;FONT color="#F88017"&gt;256&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;FONT color="#F88017"&gt;TLS_DHE_RSA_WITH_AES_128_CBC_SHA (&lt;CODE&gt;0x33&lt;/CODE&gt;) &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="greySmall"&gt;&lt;SPAN title="p: 256, g: 256, Ys: 256"&gt;DH 2048 bits&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp; FS&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;WEAK&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;&lt;FONT color="#F88017"&gt;12&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;which of the below cipher suites do I disable to comply ? (enc-algo-3des is already disabled), this is set on my global protect interface, will anything break &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;PRE class="ckeditor_codeblock"&gt;+ auth-algo-sha1         Allow authentication SHA1
+ auth-algo-sha256       Allow authentication SHA256
+ auth-algo-sha384       Allow authentication SHA384
+ enc-algo-3des          Allow algorithm 3DES
+ enc-algo-aes-128-cbc   Allow algorithm AES-128-CBC
+ enc-algo-aes-128-gcm   Allow algorithm AES-128-GCM
+ enc-algo-aes-256-cbc   Allow algorithm AES-256-CBC
+ enc-algo-aes-256-gcm   Allow algorithm AES-256-GCM
+ enc-algo-rc4           Allow algorithm RC4
+ keyxchg-algo-dhe       Allow algorithm DHE
+ keyxchg-algo-ecdhe     Allow algorithm ECDHE
+ keyxchg-algo-rsa       Allow algorithm RSA
+ max-version            max-version
+ min-version            min-version&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 22 May 2023 03:24:49 GMT</pubDate>
    <dc:creator>PaulBrock</dc:creator>
    <dc:date>2023-05-22T03:24:49Z</dc:date>
    <item>
      <title>Which  weak cipher suites for SSL/TLS to delete</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/which-weak-cipher-suites-for-ssl-tls-to-delete/m-p/542850#M111179</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;I recently had a pen test return the following results:&lt;/P&gt;
&lt;TABLE class="reportTable"&gt;
&lt;TBODY class="cipher1Block"&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;SPAN class="color-green"&gt;TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (&lt;CODE&gt;0xc030&lt;/CODE&gt;)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="greySmall"&gt;ECDH secp256r1 (eq. 3072 bits RSA) &amp;nbsp; FS&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;256&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;SPAN class="color-green"&gt;TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (&lt;CODE&gt;0xc02f&lt;/CODE&gt;)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="greySmall"&gt;ECDH secp256r1 (eq. 3072 bits RSA) &amp;nbsp; FS&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;128&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;FONT color="#F88017"&gt;TLS_RSA_WITH_AES_256_GCM_SHA384 (&lt;CODE&gt;0x9d&lt;/CODE&gt;) &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;WEAK&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;&lt;FONT color="#F88017"&gt;256&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;FONT color="#F88017"&gt;TLS_RSA_WITH_AES_128_GCM_SHA256 (&lt;CODE&gt;0x9c&lt;/CODE&gt;) &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;WEAK&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;&lt;FONT color="#F88017"&gt;128&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;FONT color="#F88017"&gt;TLS_RSA_WITH_AES_256_CBC_SHA256 (&lt;CODE&gt;0x3d&lt;/CODE&gt;) &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;WEAK&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;&lt;FONT color="#F88017"&gt;256&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;FONT color="#F88017"&gt;TLS_RSA_WITH_AES_128_CBC_SHA256 (&lt;CODE&gt;0x3c&lt;/CODE&gt;) &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;WEAK&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;&lt;FONT color="#F88017"&gt;128&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;SPAN class="color-green"&gt;TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (&lt;CODE&gt;0x9f&lt;/CODE&gt;)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="greySmall"&gt;&lt;SPAN title="p: 256, g: 256, Ys: 256"&gt;DH 2048 bits&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp; FS&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;256&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;SPAN class="color-green"&gt;TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (&lt;CODE&gt;0x9e&lt;/CODE&gt;)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="greySmall"&gt;&lt;SPAN title="p: 256, g: 256, Ys: 256"&gt;DH 2048 bits&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp; FS&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;128&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;FONT color="#F88017"&gt;TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (&lt;CODE&gt;0xc014&lt;/CODE&gt;) &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="greySmall"&gt;ECDH secp256r1 (eq. 3072 bits RSA) &amp;nbsp; FS&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;WEAK&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;&lt;FONT color="#F88017"&gt;256&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;FONT color="#F88017"&gt;TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (&lt;CODE&gt;0xc013&lt;/CODE&gt;) &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="greySmall"&gt;ECDH secp256r1 (eq. 3072 bits RSA) &amp;nbsp; FS&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;WEAK&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;&lt;FONT color="#F88017"&gt;128&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;FONT color="#F88017"&gt;TLS_RSA_WITH_AES_128_CBC_SHA (&lt;CODE&gt;0x2f&lt;/CODE&gt;) &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;WEAK&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;&lt;FONT color="#F88017"&gt;128&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;FONT color="#F88017"&gt;TLS_DHE_RSA_WITH_AES_256_CBC_SHA (&lt;CODE&gt;0x39&lt;/CODE&gt;) &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="greySmall"&gt;&lt;SPAN title="p: 256, g: 256, Ys: 256"&gt;DH 2048 bits&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp; FS&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;WEAK&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;&lt;FONT color="#F88017"&gt;256&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="tableRow"&gt;
&lt;TD class="tableLeft"&gt;&lt;FONT color="#F88017"&gt;TLS_DHE_RSA_WITH_AES_128_CBC_SHA (&lt;CODE&gt;0x33&lt;/CODE&gt;) &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="greySmall"&gt;&lt;SPAN title="p: 256, g: 256, Ys: 256"&gt;DH 2048 bits&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp; FS&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;WEAK&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD class="tableRight"&gt;&lt;FONT color="#F88017"&gt;12&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;which of the below cipher suites do I disable to comply ? (enc-algo-3des is already disabled), this is set on my global protect interface, will anything break &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;PRE class="ckeditor_codeblock"&gt;+ auth-algo-sha1         Allow authentication SHA1
+ auth-algo-sha256       Allow authentication SHA256
+ auth-algo-sha384       Allow authentication SHA384
+ enc-algo-3des          Allow algorithm 3DES
+ enc-algo-aes-128-cbc   Allow algorithm AES-128-CBC
+ enc-algo-aes-128-gcm   Allow algorithm AES-128-GCM
+ enc-algo-aes-256-cbc   Allow algorithm AES-256-CBC
+ enc-algo-aes-256-gcm   Allow algorithm AES-256-GCM
+ enc-algo-rc4           Allow algorithm RC4
+ keyxchg-algo-dhe       Allow algorithm DHE
+ keyxchg-algo-ecdhe     Allow algorithm ECDHE
+ keyxchg-algo-rsa       Allow algorithm RSA
+ max-version            max-version
+ min-version            min-version&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 03:24:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/which-weak-cipher-suites-for-ssl-tls-to-delete/m-p/542850#M111179</guid>
      <dc:creator>PaulBrock</dc:creator>
      <dc:date>2023-05-22T03:24:49Z</dc:date>
    </item>
    <item>
      <title>Re: Which  weak cipher suites for SSL/TLS to delete</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/which-weak-cipher-suites-for-ssl-tls-to-delete/m-p/542911#M111186</link>
      <description>&lt;P&gt;I assume you refer to GlobalProtect ciphers.&lt;/P&gt;
&lt;P&gt;To get A- score in SSLLabs test run following 4 commands (adjust template and profile name to match your environment)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If config is managed inside firewall&lt;/P&gt;
&lt;P&gt;set shared ssl-tls-service-profile GlobalProtect protocol-settings auth-algo-sha1 no&lt;BR /&gt;set shared ssl-tls-service-profile GlobalProtect protocol-settings enc-algo-3des no&lt;BR /&gt;set shared ssl-tls-service-profile GlobalProtect protocol-settings enc-algo-rc4 no&lt;BR /&gt;set shared ssl-tls-service-profile GlobalProtect protocol-settings keyxchg-algo-rsa no&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If config is pushed from Panorama&lt;BR /&gt;set template Template-name config shared ssl-tls-service-profile GlobalProtect protocol-settings auth-algo-sha1 no&lt;BR /&gt;set template Template-name config shared ssl-tls-service-profile GlobalProtect protocol-settings enc-algo-3des no&lt;BR /&gt;set template Template-name config shared ssl-tls-service-profile GlobalProtect protocol-settings enc-algo-rc4 no&lt;BR /&gt;set template Template-name config shared ssl-tls-service-profile GlobalProtect protocol-settings keyxchg-algo-rsa no&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 12:38:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/which-weak-cipher-suites-for-ssl-tls-to-delete/m-p/542911#M111186</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-05-22T12:38:46Z</dc:date>
    </item>
    <item>
      <title>Re: Which  weak cipher suites for SSL/TLS to delete</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/which-weak-cipher-suites-for-ssl-tls-to-delete/m-p/542914#M111187</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/46571"&gt;@PaulBrock&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;I'd really suggest running through this on a non-production portal/gateway before actually making this change on your production portal/gateway ssl-tls-service-profile. While disabling weaker protocol settings generally doesn't cause any issues, I've also run into some very odd client configuration settings that would have broken things had we not tested it prior to making the change.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;set shared ssl-tls-service-profile GlobalProtect protocol-settings keyxchg-algo-rsa no
set shared ssl-tls-service-profile GlobalProtect protocol-settings auth-algo-sha1 no
&lt;/LI-CODE&gt;
&lt;P&gt;Replace "GlobalProtect" with whatever profile you're using.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 12:40:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/which-weak-cipher-suites-for-ssl-tls-to-delete/m-p/542914#M111187</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2023-05-22T12:40:36Z</dc:date>
    </item>
    <item>
      <title>Re: Which  weak cipher suites for SSL/TLS to delete</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/which-weak-cipher-suites-for-ssl-tls-to-delete/m-p/542994#M111197</link>
      <description>&lt;P&gt;Thank you so much, this is so helpful&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I wish that when I contacted support, rather than sending KBs they would simply answer like you have.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2023 02:47:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/which-weak-cipher-suites-for-ssl-tls-to-delete/m-p/542994#M111197</guid>
      <dc:creator>PaulBrock</dc:creator>
      <dc:date>2023-05-23T02:47:31Z</dc:date>
    </item>
    <item>
      <title>Re: Which  weak cipher suites for SSL/TLS to delete</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/which-weak-cipher-suites-for-ssl-tls-to-delete/m-p/543081#M111215</link>
      <description>&lt;P&gt;I would recommend the following settings as these will get you an A- on SSL Labs:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;set shared ssl-tls-service-profile &amp;lt;SSL/TLS service profile name&amp;gt; protocol-settings auth-algo-sha1 no&lt;BR /&gt;set shared ssl-tls-service-profile &amp;lt;SSL/TLS service profile name&amp;gt; protocol-settings enc-algo-3des no&lt;BR /&gt;set shared ssl-tls-service-profile &amp;lt;SSL/TLS service profile name&amp;gt; protocol-settings enc-algo-rc4 no&lt;BR /&gt;set shared ssl-tls-service-profile &amp;lt;SSL/TLS service profile name&amp;gt; protocol-settings enc-algo-aes-128-cbc no&lt;BR /&gt;set shared ssl-tls-service-profile &amp;lt;SSL/TLS service profile name&amp;gt; protocol-settings enc-algo-aes-256-cbc no&lt;BR /&gt;set shared ssl-tls-service-profile &amp;lt;SSL/TLS service profile name&amp;gt; protocol-settings keyxchg-algo-rsa no&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is very unfortunate that Palo Alto will not fix secure renegotiation as that would get you an A+.&lt;/P&gt;
&lt;P&gt;Also sendig the root certificate should be fixed by Palo Alto.&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2023 16:49:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/which-weak-cipher-suites-for-ssl-tls-to-delete/m-p/543081#M111215</guid>
      <dc:creator>Han.Valk</dc:creator>
      <dc:date>2023-05-23T16:49:56Z</dc:date>
    </item>
    <item>
      <title>Re: Which  weak cipher suites for SSL/TLS to delete</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/which-weak-cipher-suites-for-ssl-tls-to-delete/m-p/543107#M111219</link>
      <description>&lt;P&gt;Hi Han,&lt;/P&gt;
&lt;P&gt;You must have received the same report,&lt;span class="lia-unicode-emoji" title=":grinning_face:"&gt;😀&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;the Pen testers&amp;nbsp; flagged Weak ciphers,&amp;nbsp;&lt;SPAN&gt;secure renegotiation, and also&amp;nbsp;Information Disclosure&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;With regard to Information disclosure:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I don't suppose anyone knows how to turn off Palo Alto "Palo Alto GlobalProtect Gateway httpd"&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2023 22:10:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/which-weak-cipher-suites-for-ssl-tls-to-delete/m-p/543107#M111219</guid>
      <dc:creator>PaulBrock</dc:creator>
      <dc:date>2023-05-23T22:10:12Z</dc:date>
    </item>
    <item>
      <title>Re: Which  weak cipher suites for SSL/TLS to delete</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/which-weak-cipher-suites-for-ssl-tls-to-delete/m-p/543124#M111223</link>
      <description>&lt;P&gt;Why would you want to turn off gateway access over https?&lt;/P&gt;
&lt;P&gt;It is needed for gateway functionality.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;GlobalProtect agent will try 3 times to connect over udp/4501 to establish IPSec tunnel but if it fails then it will fail back to SSL-VPN over tcp/443 (those are default ports numbers that can be changed).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2023 02:15:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/which-weak-cipher-suites-for-ssl-tls-to-delete/m-p/543124#M111223</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-05-24T02:15:45Z</dc:date>
    </item>
    <item>
      <title>Re: Which  weak cipher suites for SSL/TLS to delete</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/which-weak-cipher-suites-for-ssl-tls-to-delete/m-p/543128#M111224</link>
      <description>&lt;P&gt;Hi Raido,&lt;/P&gt;
&lt;P&gt;sorry, I probably did not explain myself properly.&lt;/P&gt;
&lt;P&gt;I need to turn off Palo Alto disclosing information to a public scan.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;at the moment you can see the following information "&lt;SPAN&gt;Palo Alto GlobalProtect Gateway httpd"&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2023 02:26:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/which-weak-cipher-suites-for-ssl-tls-to-delete/m-p/543128#M111224</guid>
      <dc:creator>PaulBrock</dc:creator>
      <dc:date>2023-05-24T02:26:13Z</dc:date>
    </item>
  </channel>
</rss>

