Exchange 2010 sp3 安全漏洞 RRS feed

  • 问题

  • 您好,针对如下安全漏洞,我的理解为禁用SSL启用TLS吗?这样对用户访问Exchange使用pop,IMAP,exchange 协议是否有影响?如何去修复该漏洞。目前环境为Exchange 2010 sp3+Server 2008 R2 ,谢谢

     The remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0. These versions of SSL are affected by several cryptog raphic flaws, including:
    - An insecure padding scheme with CBC ciphers.
    - Insecure session renegotiation and resumption schemes.
    An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications between the affected service and clients.
    Although SSL/TLS has a secure means for choosing the highest supported version of the protocol (so that these versions will be used only if the client or server support nothing better), many web browsers implement this in an unsafe way that allows an attacker to downgrade a connection (such as in POODLE). Therefore, it is recommended that these protocols be disabled entirely.
    NIST has determined that SSL 3.0 is no longer acceptable for secure communications. As of the date of enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC's definition of 'strong cryptography'.

    2019年9月5日 8:20