Replies: 2 comments 6 replies
-
Please share exactly how you are running the docker image, including configuration and certificates. All I should have to do to see the behavior is |
Beta Was this translation helpful? Give feedback.
3 replies
-
https://github.com/lukebakken/docker-library-rabbitmq-564#readme The |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
We have recently upgraded the rabbitmq alpine image from version 3.7.7 to 3.8.9
While on 3.7.7 executing
nmap -sV --script ssl-enum-ciphers -p 5671 <rabbitmq-ip>
would enumerate the list of ciphers and the tls version configured, on 3.8.9 the same command fails to enumerate the list of ciphers and identifies the service as tcpwrapped.Can you please help in pointing out the change in rabbitmq that is stopping nmap from identify the configured ciphers. Also, any alternate mechanism that I can use to identify the list of configured ciphers in versions 3.8.9 and above, would be helpful.
rabbitmq-diagnostics cipher-suites
would list the ciphers but, I guess, this might be from reading the configuration and not the same as what nmap does (probes) to figure out.====output from version 3.7.7 begins====
# nmap -sV --script ssl-enum-ciphers -p 5671 10.77.123.122
Starting Nmap 7.00 ( https://nmap.org/ ) at 2022-06-06 16:54 UTC
Nmap scan report for isenode2 (10.77.123.122)
Host is up (0.00017s latency).
PORT STATE SERVICE VERSION
5671/tcp open ssl/unknown
| ssl-enum-ciphers:
| TLSv1.2:
| ciphers:
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
| TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
| TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
| TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (sect571r1) - A
| TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (sect571r1) - A
| TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
| TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
| compressors:
| NULL
| cipher preference: client
| warnings:
| Key exchange parameters of lower strength than certificate key
|_ least strength: A
MAC Address: 00:0C:29:1C:83:46 (VMware)
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 56.34 seconds
====output from version 3.7.7 ends====
====output from version 3.8.9 begins====
# nmap -sV --script ssl-enum-ciphers -p 5671 10.77.123.122
Starting Nmap 7.70 ( https://nmap.org/ ) at 2022-05-31 13:47 UTC
Nmap scan report for isenode2 (10.77.123.122)
Host is up (0.00029s latency).
PORT STATE SERVICE VERSION
5671/tcp open tcpwrapped
MAC Address: 00:0C:29:44:12:38 (VMware)
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 5.95 seconds
====output from version 3.8.9 ends====
Beta Was this translation helpful? Give feedback.
All reactions