<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HP System Management Homepage and SSL Server Allows Anonymous Authentication Vulnerability issue in Server Management - Systems Insight Manager</title>
    <link>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/6427834#M58474</link>
    <description>&lt;P&gt;Qualys triggered&amp;nbsp;SSL Server Allows Anonymous Authentication Vulnerability on 2381 port (QID- 38142) on Linux RHEL-5.9 server. &amp;nbsp;I see latest hpsmh version (&lt;STRONG&gt;Version:7.3.1-4&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;(18 Feb 2014) for Linux on HP website but I don't see this vulnerability fix is part of this package (no info on Release notes/Enhancement tab). Can you let me know before I upgrade hpsmh package to 7.3.1-4?&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 27 Mar 2014 18:19:16 GMT</pubDate>
    <dc:creator>Rachamadagu</dc:creator>
    <dc:date>2014-03-27T18:19:16Z</dc:date>
    <item>
      <title>HP System Management Homepage and SSL Server Allows Anonymous Authentication Vulnerability issue</title>
      <link>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/6256369#M57599</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;we have had a security test passed against our servers and got back result on some HP DL380 servers that they have the SSL Server Allows Anonymous Authentication Vulnerability issue on port 2381. We have found the only SSL capable application on port 2381 is the HP System Management Homepage. Does anyone of you have any idea how to fix this issue and what is the root cause? The version of HP System Management Homepage is 7.2.0.14 and there is an update to version 7.2.1.13. I want to&amp;nbsp; ask before I proceed with the update to get know if the update fix this or it is just configuration issue. Thanks for any reply.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2013 14:02:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/6256369#M57599</guid>
      <dc:creator>DK79</dc:creator>
      <dc:date>2013-11-01T14:02:11Z</dc:date>
    </item>
    <item>
      <title>Re: HP System Management Homepage and SSL Server Allows Anonymous Authentication Vulnerability issue</title>
      <link>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/6420614#M58457</link>
      <description>&lt;P&gt;&lt;FONT size="3" face="Times New Roman"&gt;The same for us ;-(&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" face="Times New Roman"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" face="Times New Roman"&gt;We have been informed by our information security team that our servers are failing scans due to "SSL Server Allows Anonymous Authentication Vulnerability".&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" face="Times New Roman"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" face="Times New Roman"&gt;Following additional information is provided:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" face="Times New Roman"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="arial,helvetica,sans-serif" size="1"&gt;Diagnosis:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="arial,helvetica,sans-serif" size="1"&gt;The Secure Socket Layer (SSL) protocol allows for secure communication between a client and a server. The client usually authenticates the server using an algorithm like RSA or DSS. Some SSL ciphers allow SSL communication without authentication. Most common Web browsers like Microsoft Internet Explorer, Netscape and Mozilla do not use anonymous authentication ciphers by default. &lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="arial,helvetica,sans-serif" size="1"&gt;A vulnerability exists in SSL communications when clients are allowed to connect using no authentication algorithm. SSL client-server communication may use several different types of authentication: RSA, Diffie-Hellman, DSS or none. When 'none' is used, the communications are vulnerable to a man-in-the-middle attack."&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="arial,helvetica,sans-serif" size="1"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="arial,helvetica,sans-serif" size="1"&gt;Solution: Disable support for anonymous authentication.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="arial,helvetica,sans-serif" size="1"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="arial,helvetica,sans-serif" size="1"&gt;For Apache: &lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="arial,helvetica,sans-serif" size="1"&gt;&amp;nbsp;&amp;nbsp; Typically, for Apache/mod_ssl, httpd.conf or ssl.conf should have the following lines:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="arial,helvetica,sans-serif" size="1"&gt;&amp;nbsp;&amp;nbsp; SSLProtocol -ALL +SSLv3 +TLSv1&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="arial,helvetica,sans-serif" size="1"&gt;&amp;nbsp;&amp;nbsp; SSLCipherSuite ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="arial,helvetica,sans-serif" size="1"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="arial,helvetica,sans-serif" size="1"&gt;For Apache/apache_ssl include the following line in the configuration file (httpsd.conf):&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="arial,helvetica,sans-serif" size="1"&gt;&amp;nbsp;&amp;nbsp; SSLRequireCipher ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="Times New Roman" size="3"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="Times New Roman" size="3"&gt;I am running SMH 7.3.0.9 (Win64) OpenSSL/1.0.1e PHP/5.5.2&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="Times New Roman" size="3"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="Times New Roman" size="3"&gt;Has anyone else run into this?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="Times New Roman" size="3"&gt;We would Appreciate any help!&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="Times New Roman" size="3"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;SDL-Admin&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2014 12:58:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/6420614#M58457</guid>
      <dc:creator>SDL-Admin</dc:creator>
      <dc:date>2014-03-21T12:58:28Z</dc:date>
    </item>
    <item>
      <title>Re: HP System Management Homepage and SSL Server Allows Anonymous Authentication Vulnerability issue</title>
      <link>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/6422596#M58460</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we have already found a solution for this issue running the SMH on Windows. &lt;SPAN&gt;The think is to allow only SSL ciphers that does not allow anonymous key exchange. It is the “RC4” cipher for example. &amp;nbsp;You can read more about this in HP SMH documentation (&lt;/SPAN&gt;&lt;SPAN&gt;&lt;A target="_blank" href="http://h20628.www2.hp.com/km-ext/kmcsdirect/emr_na-c02779581-2.pdf"&gt;http://h20628.www2.hp.com/km-ext/kmcsdirect/emr_na-c02779581-2.pdf&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our steps to get rid of this issue was following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) navigate to installation directory of HP SMH. Default is C:\hp\hpsmh\bin on Windows&lt;BR /&gt;2) Modify the SSL cipher suite by running&amp;nbsp;command "smhconfig.exe -Z 'RC4-SHA'"&lt;BR /&gt;3) Restart the HP WEB server by&amp;nbsp;running command "smhconfig.exe -r"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hope that helps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2014 08:27:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/6422596#M58460</guid>
      <dc:creator>DK79</dc:creator>
      <dc:date>2014-03-24T08:27:30Z</dc:date>
    </item>
    <item>
      <title>Re: HP System Management Homepage and SSL Server Allows Anonymous Authentication Vulnerability issue</title>
      <link>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/6425302#M58470</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi David,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks for your explanation. Your three steps solved our vulnerability problem with HP SMH ;-)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;BR, &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Mar 2014 06:39:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/6425302#M58470</guid>
      <dc:creator>SDL-Admin</dc:creator>
      <dc:date>2014-03-26T06:39:20Z</dc:date>
    </item>
    <item>
      <title>Re: HP System Management Homepage and SSL Server Allows Anonymous Authentication Vulnerability issue</title>
      <link>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/6427834#M58474</link>
      <description>&lt;P&gt;Qualys triggered&amp;nbsp;SSL Server Allows Anonymous Authentication Vulnerability on 2381 port (QID- 38142) on Linux RHEL-5.9 server. &amp;nbsp;I see latest hpsmh version (&lt;STRONG&gt;Version:7.3.1-4&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;(18 Feb 2014) for Linux on HP website but I don't see this vulnerability fix is part of this package (no info on Release notes/Enhancement tab). Can you let me know before I upgrade hpsmh package to 7.3.1-4?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2014 18:19:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/6427834#M58474</guid>
      <dc:creator>Rachamadagu</dc:creator>
      <dc:date>2014-03-27T18:19:16Z</dc:date>
    </item>
    <item>
      <title>Re: HP System Management Homepage and SSL Server Allows Anonymous Authentication Vulnerability issue</title>
      <link>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/6445564#M58514</link>
      <description>&lt;P&gt;david..&lt;/P&gt;&lt;P&gt;do I need to log into each of my servers that has the hp system management homepage ? and run your 3 steps ? or is this only done on my HP SIM server ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Apr 2014 20:03:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/6445564#M58514</guid>
      <dc:creator>sungminjin</dc:creator>
      <dc:date>2014-04-11T20:03:15Z</dc:date>
    </item>
    <item>
      <title>Re: HP System Management Homepage and SSL Server Allows Anonymous Authentication Vulnerability issue</title>
      <link>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/6446232#M58517</link>
      <description>&lt;P&gt;Hi, you have to run this on every server running HP System Management Homepage. You can use tool like PSExec to do the job if your environment is same or run more complex script if not.&lt;/P&gt;</description>
      <pubDate>Sun, 13 Apr 2014 17:33:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/6446232#M58517</guid>
      <dc:creator>DK79</dc:creator>
      <dc:date>2014-04-13T17:33:40Z</dc:date>
    </item>
    <item>
      <title>Re: HP System Management Homepage and SSL Server Allows Anonymous Authentication Vulnerability issue</title>
      <link>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/6744460#M59772</link>
      <description>&lt;P&gt;Hello All, How do I disable "SSL Certificate Self-Signed - TCP:2381" Vulnerability? I need to fix this on few HP servers. The Current HP SHM is 7.4.1.6. Please advise.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Srinivas.K&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 May 2015 02:58:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/6744460#M59772</guid>
      <dc:creator>Srinivas0781</dc:creator>
      <dc:date>2015-05-19T02:58:37Z</dc:date>
    </item>
    <item>
      <title>Re: HP System Management Homepage and SSL Server Allows Anonymous Authentication Vulnerability issue</title>
      <link>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/6757969#M59932</link>
      <description>&lt;P&gt;David,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you just enabling RC4 in your command, when I tried it it wouldn't accept RC4-SHA, what is the SHA?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have read somewhere that RC4 isn't recommended so I am unclear as to what you are doing in this command line, clarification would be appreciated thanks as I am also trying to find a fix for 'Open SSL 'ChangeCipher Spec' MiTM Vulnerability&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jun 2015 14:52:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/6757969#M59932</guid>
      <dc:creator>John Coen</dc:creator>
      <dc:date>2015-06-23T14:52:53Z</dc:date>
    </item>
    <item>
      <title>Re: HP System Management Homepage and SSL Server Allows Anonymous Authentication Vulnerability issue</title>
      <link>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/6783922#M60300</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Plugin&lt;/STRONG&gt; &lt;STRONG&gt;Plugin Name&lt;/STRONG&gt; &lt;STRONG&gt;Family&lt;/STRONG&gt; &lt;STRONG&gt;Severity&lt;/STRONG&gt; &lt;STRONG&gt;IP Address&lt;/STRONG&gt; &lt;STRONG&gt;Protocol&lt;/STRONG&gt; &lt;STRONG&gt;Port&lt;/STRONG&gt; &lt;STRONG&gt;NetBIOS Name&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;78479 SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) General High 123.45.67.89 TCP 2381 servernamexxx&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I recieved the above in my Tenable Nexus scan and the fix listed above help resolve the issue. I re-scan and the vulnerabilty after the fix and the vulnerabilty was gone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Only change in the three steps above is that I ran &lt;STRONG&gt;&lt;EM&gt;smhconfig.exe -Z RC4-SHA&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp; without quotes around RC4-SHA (quote caused it to error out)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH anyone else.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Sep 2015 22:54:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/6783922#M60300</guid>
      <dc:creator>station11</dc:creator>
      <dc:date>2015-09-11T22:54:12Z</dc:date>
    </item>
    <item>
      <title>Re: HP System Management Homepage and SSL Server Allows Anonymous Authentication Vulnerability issue</title>
      <link>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/6801400#M60400</link>
      <description>&lt;P&gt;Isn´t RC4 weak? I read a posting &lt;A href="http://www.securityweek.com/new-attack-rc4-based-ssltls-leverages-13-year-old-vulnerability" target="_blank"&gt;here&lt;/A&gt;, that this is the case. So a better solution might be to disable RC4 as well and leave only the "secure cipher" in place. I found &lt;A href="http://www.admin-enclave.com/en/articles/windows/185-fixing-rc4-cipher-suites-supported-in-hp-system-management-homepage.html" target="_blank"&gt;here&lt;/A&gt; a short how to which worked for me. Maybe somebody else will find that usefull as well.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2015 08:42:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/6801400#M60400</guid>
      <dc:creator>BastianW</dc:creator>
      <dc:date>2015-10-12T08:42:02Z</dc:date>
    </item>
    <item>
      <title>Re: HP System Management Homepage and SSL Server Allows Anonymous Authentication Vulnerability issue</title>
      <link>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/7110732#M62556</link>
      <description>&lt;P&gt;Try;&amp;nbsp;" smhconfig.exe -Z AES256-SHA" instead of RC4-SHA as it is more secure.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Nov 2020 02:30:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/hp-system-management-homepage-and-ssl-server-allows-anonymous/m-p/7110732#M62556</guid>
      <dc:creator>Richie55</dc:creator>
      <dc:date>2020-11-26T02:30:28Z</dc:date>
    </item>
  </channel>
</rss>

