<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Verify Enabled Cipher Suites in HTTPS Inspection in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Verify-Enabled-Cipher-Suites-in-HTTPS-Inspection/m-p/19784#M3671</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The most accurate and effective way to accomplish this is in my opinion is to use nmap with the ssl-enum-ciphers script.&lt;/P&gt;&lt;P&gt;Just install nmap and download the &lt;A href="https://nmap.org/nsedoc/scripts/ssl-enum-ciphers.html"&gt;script&lt;/A&gt;&amp;nbsp;on a linux machine and you can scan a target host for the supported ciphers with the supported SSL/TLS version.&amp;nbsp;&lt;/P&gt;&lt;P&gt;You should get a output like this for example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&lt;SPAN&gt;Starting Nmap 6.40 ( &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://nmap.org" rel="nofollow"&gt;http://nmap.org&lt;/A&gt;&lt;SPAN&gt; ) at 2018-02-13 15:34 CET&lt;/SPAN&gt;&lt;BR /&gt;Nmap scan report for google.nl (216.58.210.3)&lt;BR /&gt;Host is up (0.0072s latency).&lt;BR /&gt;rDNS record for 216.58.210.3: fra16s07-in-f3.1e100.net&lt;BR /&gt;PORT STATE SERVICE&lt;BR /&gt;443/tcp open https&lt;BR /&gt;| ssl-enum-ciphers:&lt;BR /&gt;| TLSv1.0:&lt;BR /&gt;| ciphers:&lt;BR /&gt;| TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong&lt;BR /&gt;| TLS_RSA_WITH_AES_128_CBC_SHA - strong&lt;BR /&gt;| TLS_RSA_WITH_AES_256_CBC_SHA - strong&lt;BR /&gt;| compressors:&lt;BR /&gt;| NULL&lt;BR /&gt;| TLSv1.1:&lt;BR /&gt;| ciphers:&lt;BR /&gt;| TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong&lt;BR /&gt;| TLS_RSA_WITH_AES_128_CBC_SHA - strong&lt;BR /&gt;| TLS_RSA_WITH_AES_256_CBC_SHA - strong&lt;BR /&gt;| compressors:&lt;BR /&gt;| NULL&lt;BR /&gt;| TLSv1.2:&lt;BR /&gt;| ciphers:&lt;BR /&gt;| TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong&lt;BR /&gt;| TLS_RSA_WITH_AES_128_CBC_SHA - strong&lt;BR /&gt;| TLS_RSA_WITH_AES_128_GCM_SHA256 - strong&lt;BR /&gt;| TLS_RSA_WITH_AES_256_CBC_SHA - strong&lt;BR /&gt;| TLS_RSA_WITH_AES_256_GCM_SHA384 - strong&lt;BR /&gt;| compressors:&lt;BR /&gt;| NULL&lt;BR /&gt;|_ least strength: strong&lt;/P&gt;&lt;P&gt;Nmap done: 1 IP address (1 host up) scanned in 0.66 seconds&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am facing a similiar&amp;nbsp;issue at one of our customers at the moment. When we enabled the support for ECDHE we are getting the following output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;Host is up (0.021s latency).&lt;BR /&gt;PORT STATE SERVICE&lt;BR /&gt;443/tcp open https&lt;BR /&gt;| ssl-enum-ciphers:&lt;BR /&gt;| TLSv1.0:&lt;BR /&gt;| ciphers:&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA - strong&lt;BR /&gt;| TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong&lt;BR /&gt;| TLS_RSA_WITH_AES_128_CBC_SHA - strong&lt;BR /&gt;| TLS_RSA_WITH_AES_256_CBC_SHA - strong&lt;BR /&gt;| compressors:&lt;BR /&gt;| NULL&lt;BR /&gt;|_ least strength: strong&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We now only support TLSv1.0 ???&lt;/P&gt;&lt;P&gt;Please let me know if you find any solution for this issue.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit:&lt;/P&gt;&lt;P&gt;Also i use a tool called &lt;A href="https://github.com/drwetter/testssl.sh"&gt;testssl.sh&lt;/A&gt;&amp;nbsp;which i use to display the server's picks: protocol+cipher. (You can use the -P flag for that.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jelle&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 13 Feb 2018 14:41:35 GMT</pubDate>
    <dc:creator>_Jelle</dc:creator>
    <dc:date>2018-02-13T14:41:35Z</dc:date>
    <item>
      <title>Verify Enabled Cipher Suites in HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Verify-Enabled-Cipher-Suites-in-HTTPS-Inspection/m-p/19779#M3666</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Happy Holidays everyone -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is regards to: R77.30 Gateway on Take_286&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone guide me to a command or configuration setting within IPS (or wherever it resides) for what Cipher Suites we currently have enabled for HTTPS Inspection?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In a nutshell, we are evaluating TCP Dump data as we are not able to load a particular site on our network. It appears our firewall is sending SSLv3.0 @ Hello and the responding Client, not server, is basically just sending us an SYN ACK back in return that we sent prior to the hello. This site does NOT support anything other then TLS 1.2. We want to confirm our cipher suites for 1.2 have a match with the list we have grabbed from the SSL test we ran on their site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command i found on a similar article (i thought) was: cat /opt/CPshrd-R77/registry/HKLM_registry.data | grep -i cptls&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which resulted in me getting:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cptls_ec_p384 (1)&lt;BR /&gt;cptls_accept_ecdhe (1)&lt;BR /&gt;....propose &lt;BR /&gt;cptls_accept_ecdsa (1)&lt;BR /&gt;....propose&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cannot figure out what this means as both propose and accept are being listed. Is their documentation on this formatting/response? Any help is appreciated.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Dec 2017 21:14:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Verify-Enabled-Cipher-Suites-in-HTTPS-Inspection/m-p/19779#M3666</guid>
      <dc:creator>Jessa_Haines</dc:creator>
      <dc:date>2017-12-21T21:14:13Z</dc:date>
    </item>
    <item>
      <title>Re: Verify Enabled Cipher Suites in HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Verify-Enabled-Cipher-Suites-in-HTTPS-Inspection/m-p/19780#M3667</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is some discussion about Cipher Suites here:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104717" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104717"&gt;HTTPS Inspection Enhancements in R77.30 and above&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As well as here:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104562" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104562"&gt;Supported cipher suites for HTTPS Inspection&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Dec 2017 00:10:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Verify-Enabled-Cipher-Suites-in-HTTPS-Inspection/m-p/19780#M3667</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-12-22T00:10:43Z</dc:date>
    </item>
    <item>
      <title>Re: Verify Enabled Cipher Suites in HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Verify-Enabled-Cipher-Suites-in-HTTPS-Inspection/m-p/19781#M3668</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HTTPS Inspection negotiations are primarily handled by the wstlsd daemon. Here are the list of cipher suites supported on R80.10 vanilla, pretty sure this will be the same for R77.30.&amp;nbsp; Just because a suite is listed here doesn't necessarily mean that wstlsd permits it to be used by default (case in point: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110883" target="_blank"&gt;sk110883 - Specific HTTPS sites that use ECDHE ciphers are not accessible when HTTPS Inspection is enabled&lt;/A&gt;), but if a cipher suite does &lt;STRONG&gt;not&lt;/STRONG&gt; appear in this list I'm pretty sure that means wstlsd won't support it for HTTPS Inspection.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would imagine these are all valid for TLS 1.2 but I don't know how to verify that.&amp;nbsp; wstlsd does not appear to support "Suite B for TLS 1.2" if that is relevant to your situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ADH-AES128-GCM-SHA256&lt;BR /&gt;ADH-AES128-SHA&lt;BR /&gt;ADH-AES128-SHA256&lt;BR /&gt;ADH-AES256-GCM-SHA384&lt;BR /&gt;ADH-AES256-SHA&lt;BR /&gt;ADH-AES256-SHA256&lt;BR /&gt;ADH-CAMELLIA128-SHA&lt;BR /&gt;ADH-CAMELLIA256-SHA&lt;BR /&gt;ADH-DES-CBC3-SHA&lt;BR /&gt;ADH-SEED-SHA&lt;BR /&gt;AECDH-AES128-SHA&lt;BR /&gt;AECDH-AES256-SHA&lt;BR /&gt;AECDH-DES-CBC3-SHA&lt;BR /&gt;AECDH-NULL-SHA&lt;BR /&gt;AECDH-RC4-SHA&lt;BR /&gt;DH-DSS-AES128-GCM-SHA256&lt;BR /&gt;DH-DSS-AES128-SHA&lt;BR /&gt;DH-DSS-AES128-SHA256&lt;BR /&gt;DH-DSS-AES256-GCM-SHA384&lt;BR /&gt;DH-DSS-AES256-SHA&lt;BR /&gt;DH-DSS-AES256-SHA256&lt;BR /&gt;DH-DSS-CAMELLIA128-SHA&lt;BR /&gt;DH-DSS-CAMELLIA256-SHA&lt;BR /&gt;DH-DSS-SEED-SHA&lt;BR /&gt;DH-RSA-AES256-SHA256&lt;BR /&gt;DH-RSA-CAMELLIA128-SHA&lt;BR /&gt;DH-RSA-CAMELLIA256-SHA&lt;BR /&gt;DH-RSA-SEED-SHA&lt;BR /&gt;DHE-DSS-AES128-GCM-SHA256&lt;BR /&gt;DHE-DSS-AES128-SHA&lt;BR /&gt;DHE-DSS-AES128-SHA256&lt;BR /&gt;DHE-DSS-AES256-GCM-SHA384&lt;BR /&gt;DHE-DSS-AES256-SHA&lt;BR /&gt;DHE-DSS-AES256-SHA256&lt;BR /&gt;DHE-DSS-CAMELLIA128-SHA&lt;BR /&gt;DHE-DSS-CAMELLIA256-SHA&lt;BR /&gt;DHE-DSS-SEED-SHA&lt;BR /&gt;DHE-RSA-AES256-SHA256&lt;BR /&gt;DHE-RSA-CAMELLIA128-SHA&lt;BR /&gt;DHE-RSA-CAMELLIA256-SHA&lt;BR /&gt;DHE-RSA-SEED-SHA&lt;BR /&gt;ECDH-ECDSA-AES128-GCM-SHA256&lt;BR /&gt;ECDH-ECDSA-AES128-SHA&lt;BR /&gt;ECDH-ECDSA-AES128-SHA256&lt;BR /&gt;ECDH-ECDSA-AES256-GCM-SHA384&lt;BR /&gt;ECDH-ECDSA-AES256-SHA&lt;BR /&gt;ECDH-ECDSA-AES256-SHA384&lt;BR /&gt;ECDH-ECDSA-DES-CBC3-SHA&lt;BR /&gt;ECDH-ECDSA-NULL-SHA&lt;BR /&gt;ECDH-ECDSA-RC4-SHA&lt;BR /&gt;ECDH-RSA-AES128-GCM-SHA256&lt;BR /&gt;ECDH-RSA-AES128-SHA&lt;BR /&gt;ECDH-RSA-AES128-SHA256&lt;BR /&gt;ECDH-RSA-AES256-GCM-SHA384&lt;BR /&gt;ECDH-RSA-AES256-SHA&lt;BR /&gt;ECDH-RSA-AES256-SHA384&lt;BR /&gt;ECDH-RSA-DES-CBC3-SHA&lt;BR /&gt;ECDH-RSA-NULL-SHA&lt;BR /&gt;ECDH-RSA-RC4-SHA&lt;BR /&gt;ECDHE-ECDSA-AES128-GCM-SHA256&lt;BR /&gt;ECDHE-ECDSA-AES128-SHA&lt;BR /&gt;ECDHE-ECDSA-AES128-SHA256&lt;BR /&gt;ECDHE-ECDSA-AES256-GCM-SHA384&lt;BR /&gt;ECDHE-ECDSA-AES256-SHA&lt;BR /&gt;ECDHE-ECDSA-AES256-SHA384&lt;BR /&gt;ECDHE-ECDSA-DES-CBC3-SHA&lt;BR /&gt;ECDHE-ECDSA-NULL-SHA&lt;BR /&gt;ECDHE-ECDSA-RC4-SHA&lt;BR /&gt;ECDHE-RSA-AES128-GCM-SHA256&lt;BR /&gt;ECDHE-RSA-AES128-SHA&lt;BR /&gt;ECDHE-RSA-AES128-SHA256&lt;BR /&gt;ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;ECDHE-RSA-AES256-SHA&lt;BR /&gt;ECDHE-RSA-AES256-SHA384&lt;BR /&gt;ECDHE-RSA-DES-CBC3-SHA&lt;BR /&gt;ECDHE-RSA-NULL-SHA&lt;BR /&gt;ECDHE-RSA-RC4-SHA&lt;BR /&gt;EDH-DSS-DES-CBC3-SHA&lt;BR /&gt;EDH-RSA-DES-CBC3-SHA&lt;BR /&gt;EXP-ADH-DES-CBC-SHA&lt;BR /&gt;EXP-ADH-RC4-MD5&lt;BR /&gt;EXP-DES-CBC-SHA&lt;BR /&gt;EXP-DH-DSS-DES-CBC-SHA&lt;BR /&gt;EXP-DH-RSA-DES-CBC-SHA&lt;BR /&gt;EXP-EDH-DSS-DES-CBC-SHA&lt;BR /&gt;EXP-EDH-RSA-DES-CBC-SHA&lt;BR /&gt;EXP-RC2-CBC-MD5&lt;BR /&gt;EXP-RC4-MD5&lt;BR /&gt;GOST2001-GOST89-GOST89&lt;BR /&gt;GOST2001-NULL-GOST94&lt;BR /&gt;GOST94-GOST89-GOST89&lt;BR /&gt;GOST94-NULL-GOST94&lt;BR /&gt;IDEA-CBC-SHA&lt;BR /&gt;NULL-MD5&lt;BR /&gt;NULL-SHA256&lt;BR /&gt;PSK-3DES-EDE-CBC-SHA&lt;BR /&gt;PSK-AES128-CBC-SHA&lt;BR /&gt;PSK-AES256-CBC-SHA&lt;BR /&gt;PSK-RC4-SHA&lt;BR /&gt;SRP-3DES-EDE-CBC-SHA&lt;BR /&gt;SRP-AES-128-CBC-SHA&lt;BR /&gt;SRP-AES-256-CBC-SHA&lt;BR /&gt;SRP-DSS-3DES-EDE-CBC-SHA&lt;BR /&gt;SRP-DSS-AES-128-CBC-SHA&lt;BR /&gt;SRP-DSS-AES-256-CBC-SHA&lt;BR /&gt;SRP-RSA-3DES-EDE-CBC-SHA&lt;BR /&gt;SRP-RSA-AES-128-CBC-SHA&lt;BR /&gt;SRP-RSA-AES-256-CBC-SHA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; My Book "Max Power: Check Point Firewall Performance Optimization" &lt;BR /&gt; Second Edition Coming Soon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Dec 2017 03:00:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Verify-Enabled-Cipher-Suites-in-HTTPS-Inspection/m-p/19781#M3668</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2017-12-22T03:00:18Z</dc:date>
    </item>
    <item>
      <title>Re: Verify Enabled Cipher Suites in HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Verify-Enabled-Cipher-Suites-in-HTTPS-Inspection/m-p/19782#M3669</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/2075"&gt;Dameon Welch Abernathy&lt;/A&gt;‌ and @timhall&amp;nbsp; - Cheers for the replies guys. I have already checked out the links you provided Dameon.&amp;nbsp;What I am&amp;nbsp;looking for is a way to confirm what ciphers are allowed through HTTPS on our device, visually in some type of list form. Take note of the list i included in my post about proposing/accept, i would love to know what that is referring to as another post stated this is where you can see what ciphers are accepted or not. @Timhall thanks for the explanation of how https is getting its ciphers. I&amp;nbsp;will continuing reading on this and see if i can make any further progress on this front. Happy Holidays!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Dec 2017 16:29:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Verify-Enabled-Cipher-Suites-in-HTTPS-Inspection/m-p/19782#M3669</guid>
      <dc:creator>Jessa_Haines</dc:creator>
      <dc:date>2017-12-22T16:29:18Z</dc:date>
    </item>
    <item>
      <title>Re: Verify Enabled Cipher Suites in HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Verify-Enabled-Cipher-Suites-in-HTTPS-Inspection/m-p/19783#M3670</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One of the SKs I linked above mentions this:&amp;nbsp;&lt;A class="link-titled" href="https://www.ssllabs.com/ssltest/" title="https://www.ssllabs.com/ssltest/"&gt;SSL Server Test (Powered by Qualys SSL Labs)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This will tell you what ciphers are supported by a given site.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Dec 2017 19:46:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Verify-Enabled-Cipher-Suites-in-HTTPS-Inspection/m-p/19783#M3670</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-12-22T19:46:22Z</dc:date>
    </item>
    <item>
      <title>Re: Verify Enabled Cipher Suites in HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Verify-Enabled-Cipher-Suites-in-HTTPS-Inspection/m-p/19784#M3671</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The most accurate and effective way to accomplish this is in my opinion is to use nmap with the ssl-enum-ciphers script.&lt;/P&gt;&lt;P&gt;Just install nmap and download the &lt;A href="https://nmap.org/nsedoc/scripts/ssl-enum-ciphers.html"&gt;script&lt;/A&gt;&amp;nbsp;on a linux machine and you can scan a target host for the supported ciphers with the supported SSL/TLS version.&amp;nbsp;&lt;/P&gt;&lt;P&gt;You should get a output like this for example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&lt;SPAN&gt;Starting Nmap 6.40 ( &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://nmap.org" rel="nofollow"&gt;http://nmap.org&lt;/A&gt;&lt;SPAN&gt; ) at 2018-02-13 15:34 CET&lt;/SPAN&gt;&lt;BR /&gt;Nmap scan report for google.nl (216.58.210.3)&lt;BR /&gt;Host is up (0.0072s latency).&lt;BR /&gt;rDNS record for 216.58.210.3: fra16s07-in-f3.1e100.net&lt;BR /&gt;PORT STATE SERVICE&lt;BR /&gt;443/tcp open https&lt;BR /&gt;| ssl-enum-ciphers:&lt;BR /&gt;| TLSv1.0:&lt;BR /&gt;| ciphers:&lt;BR /&gt;| TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong&lt;BR /&gt;| TLS_RSA_WITH_AES_128_CBC_SHA - strong&lt;BR /&gt;| TLS_RSA_WITH_AES_256_CBC_SHA - strong&lt;BR /&gt;| compressors:&lt;BR /&gt;| NULL&lt;BR /&gt;| TLSv1.1:&lt;BR /&gt;| ciphers:&lt;BR /&gt;| TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong&lt;BR /&gt;| TLS_RSA_WITH_AES_128_CBC_SHA - strong&lt;BR /&gt;| TLS_RSA_WITH_AES_256_CBC_SHA - strong&lt;BR /&gt;| compressors:&lt;BR /&gt;| NULL&lt;BR /&gt;| TLSv1.2:&lt;BR /&gt;| ciphers:&lt;BR /&gt;| TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong&lt;BR /&gt;| TLS_RSA_WITH_AES_128_CBC_SHA - strong&lt;BR /&gt;| TLS_RSA_WITH_AES_128_GCM_SHA256 - strong&lt;BR /&gt;| TLS_RSA_WITH_AES_256_CBC_SHA - strong&lt;BR /&gt;| TLS_RSA_WITH_AES_256_GCM_SHA384 - strong&lt;BR /&gt;| compressors:&lt;BR /&gt;| NULL&lt;BR /&gt;|_ least strength: strong&lt;/P&gt;&lt;P&gt;Nmap done: 1 IP address (1 host up) scanned in 0.66 seconds&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am facing a similiar&amp;nbsp;issue at one of our customers at the moment. When we enabled the support for ECDHE we are getting the following output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;Host is up (0.021s latency).&lt;BR /&gt;PORT STATE SERVICE&lt;BR /&gt;443/tcp open https&lt;BR /&gt;| ssl-enum-ciphers:&lt;BR /&gt;| TLSv1.0:&lt;BR /&gt;| ciphers:&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA - strong&lt;BR /&gt;| TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong&lt;BR /&gt;| TLS_RSA_WITH_AES_128_CBC_SHA - strong&lt;BR /&gt;| TLS_RSA_WITH_AES_256_CBC_SHA - strong&lt;BR /&gt;| compressors:&lt;BR /&gt;| NULL&lt;BR /&gt;|_ least strength: strong&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We now only support TLSv1.0 ???&lt;/P&gt;&lt;P&gt;Please let me know if you find any solution for this issue.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit:&lt;/P&gt;&lt;P&gt;Also i use a tool called &lt;A href="https://github.com/drwetter/testssl.sh"&gt;testssl.sh&lt;/A&gt;&amp;nbsp;which i use to display the server's picks: protocol+cipher. (You can use the -P flag for that.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jelle&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2018 14:41:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Verify-Enabled-Cipher-Suites-in-HTTPS-Inspection/m-p/19784#M3671</guid>
      <dc:creator>_Jelle</dc:creator>
      <dc:date>2018-02-13T14:41:35Z</dc:date>
    </item>
    <item>
      <title>Re: Verify Enabled Cipher Suites in HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Verify-Enabled-Cipher-Suites-in-HTTPS-Inspection/m-p/19785#M3672</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That might be worth a case with the TAC as that doesn't sound right...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2018 17:00:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Verify-Enabled-Cipher-Suites-in-HTTPS-Inspection/m-p/19785#M3672</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-02-13T17:00:41Z</dc:date>
    </item>
    <item>
      <title>Re: Verify Enabled Cipher Suites in HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Verify-Enabled-Cipher-Suites-in-HTTPS-Inspection/m-p/50940#M10072</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Setting both accept flags seem unproductive, using accept forces the engine just negotiate ECDHE and ECDSA in “Only”. To allow/choose either use “propose” in this case, for accept option you can only choose “Only” ECDHE or “Only” ECDSA using the accept option.&amp;nbsp;&lt;/P&gt;&lt;P&gt;This info is available in sk104717 I believe is the one of the cases PhoneBoy shared here.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2019 14:04:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Verify-Enabled-Cipher-Suites-in-HTTPS-Inspection/m-p/50940#M10072</guid>
      <dc:creator>MrSaintz</dc:creator>
      <dc:date>2019-04-15T14:04:23Z</dc:date>
    </item>
  </channel>
</rss>

