Symptoms
The NetWorker server and NetWorker Management Console (NMC) server are deployed on a Windows based operating system.Security scanner flags port 5671 and port 5432 as negotiating with TLS 1.0 and TLS 1.1.
Cause
The Windows operating system registry path \\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols is empty, which indicates that all TLS versions are enabled.
Figure 1: Windows Operating System Registry Screenshot
Since the old TLS versions are enabled, ports 5671 and 5432 used them during the negotiation.
Resolution
Mitigate this vulnerability by making the following changes to the rabbitmq and Postgres configurations.
For rabbitmq port 5671:
On the NetWorker server, edit the "C:\Program Files\EMC NetWorker\nsr\rabbitmq-server-3.8.18\etc\rabbitmq.conf" file with the following line.
From:
% disable TLS 1.0, remove tlsv1.1 if it is not needed
{versions, ['tlsv1.2', 'tlsv1.1']},
To:
% disable TLS 1.0, remove tlsv1.1 if it is not needed
{versions, ['tlsv1.2']},
Save the changes to the file.
NOTE: NetWorker services must be restarted for the changes to take effect. However, this can be done after the ciphers for port 5432 are modified as per the below steps.
For Postgres port 5432:
On the NMC server, edit "C:\Program Files\EMC NetWorker\Management\nmcdb\pgdata\postgresql.conf" file with the following line.
From:
ssl_ciphers = 'TLSv1.2:HIGH:!SSLv3:!NULL:!ADH:!MEDIUM:!LOW:!EXP:!MD5:!RC4:!3DES:@STRENGTH' #allowed SSL ciphers
To:
ssl_ciphers = 'TLSv1.2:!TLSv1.1:!TLSv1.0:HIGH:!SSLv3:!NULL:!ADH:!MEDIUM:!LOW:!EXP:!MD5:!RC4:!3DES:@STRENGTH' #allowed SSL ciphers
Save the changes to the file.
Restart Services:
Restart the NetWorker server and NMC server services with the following command:
net stop nsrexecd /y
NOTE: This command stops all NetWorker and NMC services.
If the system is both a NetWorker server and NMC server, run the following commands:
net start nsrd
net start gstd
If the system is an NMC server only, run the following commands:
net start nsrexecd
net start gstd