automation-suite
2024.10
true
UiPath logo, featuring letters U and I in white
Guía de instalación de Automation Suite en Linux
Last updated 14 de nov. de 2024

How to check the TLS version

You can check your current TLS version using the sslscan tool. To get sslscan, use one of the following methods:
  • Option A: Direct installation on the host.

    This method requires you to install sslscan directly on your host system by running the following command:
    sslscan <host>
    
    E.g
    sslscan cusfqa7202527-cluster.infra-sf-ea.infra.uipath-dev.comsslscan <host>
    
    E.g
    sslscan cusfqa7202527-cluster.infra-sf-ea.infra.uipath-dev.com
  • Option B: Using a container management tool.

    This methods involved the use of a container management tool such as Podman or Docker to launch the sslscan container. The following example shows how to do this using Podman.
    podman run --net=host docker.io/cmoore1776/sslscan:2.1.5 <host>
    
    E.g
    podman run --net=host docker.io/cmoore1776/sslscan:2.1.5 cusfqa7202527-cluster.infra-sf-ea.infra.uipath-dev.compodman run --net=host docker.io/cmoore1776/sslscan:2.1.5 <host>
    
    E.g
    podman run --net=host docker.io/cmoore1776/sslscan:2.1.5 cusfqa7202527-cluster.infra-sf-ea.infra.uipath-dev.com

Regardless of the option you choose, the output that you get should be similar to the one shown in the following code snippet:

SSL/TLS Protocols:
SSLv2     disabled
SSLv3     disabled
TLSv1.0   disabled
TLSv1.1   disabled
TLSv1.2   enabled
TLSv1.3   enabled

  TLS Fallback SCSV:
Server supports TLS Fallback SCSV

  TLS renegotiation:
Session renegotiation not supported

  TLS Compression:
Compression disabled

  Heartbleed:
TLSv1.3 not vulnerable to heartbleed
TLSv1.2 not vulnerable to heartbleed

  Supported Server Cipher(s):
Preferred TLSv1.3  128 bits  TLS_AES_128_GCM_SHA256        Curve 25519 DHE 253
Accepted  TLSv1.3  256 bits  TLS_AES_256_GCM_SHA384        Curve 25519 DHE 253
Accepted  TLSv1.3  256 bits  TLS_CHACHA20_POLY1305_SHA256  Curve 25519 DHE 253
Preferred TLSv1.2  256 bits  ECDHE-RSA-CHACHA20-POLY1305   Curve 25519 DHE 253
Accepted  TLSv1.2  128 bits  ECDHE-RSA-AES128-GCM-SHA256   Curve 25519 DHE 253
Accepted  TLSv1.2  256 bits  ECDHE-RSA-AES256-GCM-SHA384   Curve 25519 DHE 253  SSL/TLS Protocols:
SSLv2     disabled
SSLv3     disabled
TLSv1.0   disabled
TLSv1.1   disabled
TLSv1.2   enabled
TLSv1.3   enabled

  TLS Fallback SCSV:
Server supports TLS Fallback SCSV

  TLS renegotiation:
Session renegotiation not supported

  TLS Compression:
Compression disabled

  Heartbleed:
TLSv1.3 not vulnerable to heartbleed
TLSv1.2 not vulnerable to heartbleed

  Supported Server Cipher(s):
Preferred TLSv1.3  128 bits  TLS_AES_128_GCM_SHA256        Curve 25519 DHE 253
Accepted  TLSv1.3  256 bits  TLS_AES_256_GCM_SHA384        Curve 25519 DHE 253
Accepted  TLSv1.3  256 bits  TLS_CHACHA20_POLY1305_SHA256  Curve 25519 DHE 253
Preferred TLSv1.2  256 bits  ECDHE-RSA-CHACHA20-POLY1305   Curve 25519 DHE 253
Accepted  TLSv1.2  128 bits  ECDHE-RSA-AES128-GCM-SHA256   Curve 25519 DHE 253
Accepted  TLSv1.2  256 bits  ECDHE-RSA-AES256-GCM-SHA384   Curve 25519 DHE 253

¿Te ha resultado útil esta página?

Obtén la ayuda que necesitas
RPA para el aprendizaje - Cursos de automatización
Foro de la comunidad UiPath
Uipath Logo White
Confianza y seguridad
© 2005-2024 UiPath. Todos los derechos reservados.