Hello,
I would like an infomation how to fix weak DH key Exchange Supported (PCI DSS). I have got a report from VA scan about weak DH key Exchange Supported on tcp/8443 tcp/8446
106459 - Weak DH Key Exchange Supported (PCI DSS) A service on the remote host supports a weak key exchange mechanism
Description:
At least one of the services on the remote host supports a
Diffie-Hellman key exchange using a public modulus smaller than 2048
bits.
Diffie-Hellman key exchanges with keys smaller than 2048 bits do not
meet the PCI definition of strong cryptography as specified by
NIST Special Publication 800-57 Part 1.
Diffie-Hellman moduli of up to 1024 bits are considered practically
breakable by an attacker with very significant resources.
Solution:
Consult the software's manual and reconfigure the service to use at least 2048-bit DH parameters. Alternatively, disable DH and use only Elliptic-curve Diffie-Hellman (ECDH) instead.
My SEPM server OS is Windows server 2012 R2. All clients are Windows server 2003 R2, Windows server 2008 R2, Windows server 2012 R2, Windows 7, Windows 10
How to solve this issue ?
What is parameter that I should to configure on ssl.conf file ?
After configured cipher suite to ECDH. Is it support for all my clients OS or I should configure parameter on my clients ?
Thank you for your support.