<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.sophos.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>Disable TLS 1.0 on Web Application Firewall</title><link>https://community.sophos.com/utm-firewall/f/general-discussion/89791/disable-tls-1-0-on-web-application-firewall</link><description>I have an Exchange server published by the Web Application Firewall, which works pretty well save for a few issues. A big problem is that the Web Application Firewall supports TLS 1.0 and as a result, we are getting dinged on PCI scans. I have disabled</description><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>RE: Disable TLS 1.0 on Web Application Firewall</title><link>https://community.sophos.com/thread/325726?ContentTypeID=1</link><pubDate>Mon, 13 Mar 2017 16:09:31 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:01584bfd-a9ed-4b5a-92ff-2381bbb55871</guid><dc:creator>BAlfson</dc:creator><description>&lt;p&gt;Hard to get too excited before I even get invited to the closed beta. [;)]&lt;/p&gt;
&lt;p&gt;Cheers - Bob&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Disable TLS 1.0 on Web Application Firewall</title><link>https://community.sophos.com/thread/325537?ContentTypeID=1</link><pubDate>Fri, 10 Mar 2017 10:10:42 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:6866f20f-5624-4589-aa2a-bd39dc5255dd</guid><dc:creator>ewadie</dc:creator><description>&lt;p&gt;From &lt;a title="UTM 9.5 coming soon" href="/products/unified-threat-management/f/general-discussion/87761/utm-9-5-coming-soon"&gt;another thread&lt;/a&gt; in this forum:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;UTM 9.5 coming soon&lt;/p&gt;
&lt;p&gt;Web Application Firewall:&lt;/p&gt;
&lt;p&gt;WAF TLS version allows the option to specify the required TLS version required for a virtual server, which enables PCI compliance by excluding TLS1.0&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;So I suggest you get excited about UTM 9.5 ;-)&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Disable TLS 1.0 on Web Application Firewall</title><link>https://community.sophos.com/thread/325536?ContentTypeID=1</link><pubDate>Fri, 10 Mar 2017 10:06:26 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:29dad1df-359e-4385-a44f-9cdfa7ac4c0b</guid><dc:creator>sachingurung</dc:creator><description>&lt;p&gt;I am editing my previous suggestion as per a latest update.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Disable TLS 1.0 on Web Application Firewall</title><link>https://community.sophos.com/thread/325522?ContentTypeID=1</link><pubDate>Fri, 10 Mar 2017 08:17:56 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:94bcc4c5-f3fc-484b-a193-b3be324085ed</guid><dc:creator>NickT</dc:creator><description>&lt;p&gt;The firewall is running 9.411 and is still getting dinged for TLS 1.0. &amp;nbsp;I am able to confirm this by running the following NMAPcommand.&lt;/p&gt;
&lt;p&gt;nmap --script ssl-enum-ciphers host.domain.com&lt;/p&gt;
&lt;p&gt;It shows that it is able to establish a connection using TLS 1.0. &amp;nbsp;If I turn off the WAF and use a DNAT, NMAP is not able to establish a connection with TLS 1.0.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Disable TLS 1.0 on Web Application Firewall</title><link>https://community.sophos.com/thread/325474?ContentTypeID=1</link><pubDate>Fri, 10 Mar 2017 04:34:08 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:8cbc362f-8b0d-4c61-a685-6337013b7019</guid><dc:creator>sachingurung</dc:creator><description>&lt;p&gt;Hi NickTria,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;We have disabled the TLS1.0 from v9.5 and this will be covered under NUTM-5056. It will be then possible to configure the minimal TLS version that is allowed for connections to WAF. I think there will be a GUI option to configure the TLS version use.&lt;/p&gt;
&lt;p&gt;Thanks&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Disable TLS 1.0 on Web Application Firewall</title><link>https://community.sophos.com/thread/325450?ContentTypeID=1</link><pubDate>Fri, 10 Mar 2017 02:01:46 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:ff54f37f-4208-41b3-9398-75ae5540ef26</guid><dc:creator>Vels</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;This has had a lot of attention the past 1-2 years and I actually thought it should have been disabled from version 9.4.&lt;/p&gt;
&lt;p&gt;Except for the CLI method, only way I can think of is to DNAT instead (as you already fixed the Exchange IIS), until this is officially fixed.&lt;/p&gt;
&lt;p&gt;However, you can disable it in the CLI - but it will likely &lt;span style="color:#ff0000;"&gt;void your warranty&lt;/span&gt; if you are a paying customer, in that case you are likely better of having support do it for you.&lt;/p&gt;
&lt;p&gt;There is a guide for the WAF here also with a reference to another blog for webadmin etc&amp;nbsp;: &lt;a href="http://utdream.org/post.cfm/how-to-disable-tlsv1-on-sophos-utm9-waf-for-pci"&gt;http://utdream.org/post.cfm/how-to-disable-tlsv1-on-sophos-utm9-waf-for-pci&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="color:#0000ff;"&gt;&amp;gt; QUOTE &amp;lt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="color:#0000ff;"&gt;After (a lot) of digging, I found that the sites running behind the Sophos WAF do so through the Sophos Service &amp;quot;reverseproxy&amp;quot;. This is the service we need to edit to remove TLSv1 support.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="color:#0000ff;"&gt;The above documentation talks about hwo to go about logging into the command line on a Sophos UTM9, so I won&amp;#39;t repeat it. Once you&amp;#39;re logged in, you&amp;#39;ll need to run the following commands:&lt;/span&gt;&lt;/p&gt;
&lt;pre&gt;&lt;span style="color:#0000ff;"&gt;sudo vim /var/storage/chroot-reverseproxy/usr/apache/conf/httpd.conf&lt;/span&gt;&lt;/pre&gt;
&lt;p&gt;&lt;span style="color:#0000ff;"&gt;Update these to lines:&lt;/span&gt;&lt;/p&gt;
&lt;pre&gt;&lt;span style="color:#0000ff;"&gt;SSLCipherSuite ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:RSA+AESGCM:RSA+AES:ECDH+3DES:DH+3DES:RSA+3DES:!aNULL:!MD5:!DSS
#SSLProtocol all -SSLv2 -SSLv3&lt;/span&gt;&lt;/pre&gt;
&lt;p&gt;&lt;span style="color:#0000ff;"&gt;to this&lt;/span&gt;&lt;/p&gt;
&lt;pre&gt;&lt;span style="color:#0000ff;"&gt;SSLCipherSuite ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:RSA+AES:!ADH:!AECDH:!MD5:!DSS:!3DES
SSLProtocol +TLSv1.1 +TLSv1.2&lt;/span&gt;&lt;/pre&gt;
&lt;p&gt;&lt;span style="color:#0000ff;"&gt;The restart the &amp;#39;reverseproxy&amp;quot; service with the following command:&lt;/span&gt;&lt;/p&gt;
&lt;pre&gt;&lt;span style="color:#0000ff;"&gt;sudo /var/mdw/scripts/reverseproxy restart&lt;/span&gt;&lt;/pre&gt;
&lt;p&gt;&lt;span style="color:#0000ff;"&gt;Check that you can no longer acccess your site using TLSv1 with the following command (updating it with your own domain name):&lt;/span&gt;&lt;/p&gt;
&lt;pre&gt;&lt;span style="color:#0000ff;"&gt;openssl s_client -connect utdream.org:443 -tls1&lt;/span&gt;&lt;/pre&gt;
&lt;p&gt;&lt;span style="color:#0000ff;"&gt;You&amp;#39;ll get a handshake failed error if TLSv1 has been properly disabled:&lt;/span&gt;&lt;/p&gt;
&lt;pre&gt;&lt;span style="color:#0000ff;"&gt;SSL handshake has read 0 bytes and written 0 bytes&lt;br /&gt;&lt;br /&gt;&amp;gt;/QUOTE&amp;lt;&lt;br /&gt;&lt;/span&gt;&lt;/pre&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>