| From: | Ehtesham Pradhan <ehtesham(dot)pradhan(at)lookout(dot)com> |
|---|---|
| To: | pgsql-general(at)lists(dot)postgresql(dot)org |
| Subject: | TLS 1.0 |
| Date: | 2021-08-06 09:08:58 |
| Message-ID: | CAMr8OH9u+RT7BbhZM4+BKf_aZDtM0Ku+EZJsoWWArHweqRyV0w@mail.gmail.com |
| Views: | Whole Thread | Raw Message | Download mbox | Resend email |
| Thread: | |
| Lists: | pgsql-general |
Hi Team,
Our client is using Version : PostgreSQL 9.6.17 , they have done vulnerability
assessment and found that :
- TLS version 1.0 Protocol detection
- The remote service encrypt traffic with older version of TLS
We suggested the below changes in PostgresSQL.conf
ssl_ciphers = 'HIGH:!aNULL' *OR *ssl_ciphers = 'HIGH:TLSv1.2:!aNULL'
ssl_prefer_server_ciphers = on
ssl_ecdh_curve = 'prime256v1'
But the scan report is still the same. Can you please guide with the
configuration in the present Postgres version to remediate it.
Thanks
| From | Date | Subject | |
|---|---|---|---|
| Next Message | Tom Lane | 2021-08-06 13:50:34 | Re: psql's default database on connect (our internal ref. SRP-30861) |
| Previous Message | hubert depesz lubaczewski | 2021-08-06 08:06:39 | Re: psql's default database on connect (our internal ref. SRP-30861) |