Schwache TLS Ciphers deaktivieren

Disable all weak TLS Cipher Suites

Schwache TLS Cipher Suites abschalten

Schwache Verschlüsselungssammlungen sind ein Grund dafür, das gewisse Services von einem Webbrowser verweigert werden können.

SSL/TLS sind Protokolle, die eine verschlüsselte Verbindung zwischen zwei Teilnehmern garantiert. SSL/TLS unterstützt dabei die verschiedensten Algorithmen, wobei einige bereits als schwach  gelten, da entweder der Algorithmus Schwächen aufweist oder die verwendeten Schlüssel zu kurz sind.

Disable all weak TLS Cipher Suites

Um die Möglichkeit einer unsicheren Verbindung nicht aufkommen zu lassen, ist es empfehlenswert, sämtliche Algorithmen, die nur eine Pseudo-Verschlüsselung oder eine unzureichende Verschlüsselung bieten, zu deaktivieren.

Dieses Skript enthält eine Liste schwacher Cipher Suites; sofern diese auf dem System vorhanden sind, direkt deaktiviert werden.

Schwache TLS Cipher Suites abschalten

Disable all weak Cipher Suites

Die Cipher Suiten lassen sich vorher und nachher mit diesem Befehl auslesen.
# (Get-TlsCipherSuite).Name

Disable weak TLS Ciphers

$WeakCiphers =
@(
“TLS_SRP_SHA_WITH_AES_256_CBC_SHA”
“TLS_SRP_SHA_WITH_AES_128_CBC_SHA”
“TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA”
“TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA”
“TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA”
“TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA”
“TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA”
“TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA”
“TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA”
“TLS_RSA_WITH_SEED_CBC_SHA”
“TLS_RSA_WITH_IDEA_CBC_SHA”
“TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384”
“TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256”
“TLS_RSA_WITH_CAMELLIA_256_CBC_SHA”
“TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256”
“TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256”
“TLS_RSA_WITH_CAMELLIA_128_CBC_SHA”
“TLS_RSA_WITH_ARIA_256_GCM_SHA384”
“TLS_RSA_WITH_ARIA_256_CBC_SHA384”
“TLS_RSA_WITH_ARIA_128_GCM_SHA256”
“TLS_RSA_WITH_ARIA_128_CBC_SHA256”
“TLS_RSA_WITH_AES_256_GCM_SHA384”
“TLS_RSA_WITH_AES_256_CCM_8”
“TLS_RSA_WITH_AES_256_CCM”
“TLS_RSA_WITH_AES_256_CBC_SHA256”
“TLS_RSA_WITH_AES_256_CBC_SHA”
“TLS_RSA_WITH_AES_128_GCM_SHA256”
“TLS_RSA_WITH_AES_128_CCM_8”
“TLS_RSA_WITH_AES_128_CCM”
“TLS_RSA_WITH_AES_128_CBC_SHA256”
“TLS_RSA_WITH_AES_128_CBC_SHA”
“TLS_RSA_WITH_3DES_EDE_CBC_SHA”
“TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256”
“TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384”
“TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384”
“TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256”
“TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256”
“TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384”
“TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384”
“TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256”
“TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256”
“TLS_RSA_PSK_WITH_AES_256_GCM_SHA384”
“TLS_RSA_PSK_WITH_AES_256_CBC_SHA384”
“TLS_RSA_PSK_WITH_AES_256_CBC_SHA”
“TLS_RSA_PSK_WITH_AES_128_GCM_SHA256”
“TLS_RSA_PSK_WITH_AES_128_CBC_SHA256”
“TLS_RSA_PSK_WITH_AES_128_CBC_SHA”
“TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA”
“TLS_PSK_WITH_CHACHA20_POLY1305_SHA256”
“TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384”
“TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384”
“TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256”
“TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256”
“TLS_PSK_WITH_ARIA_256_GCM_SHA384”
“TLS_PSK_WITH_ARIA_256_CBC_SHA384”
“TLS_PSK_WITH_ARIA_128_GCM_SHA256”
“TLS_PSK_WITH_ARIA_128_CBC_SHA256”
“TLS_PSK_WITH_AES_256_GCM_SHA384”
“TLS_PSK_WITH_AES_256_CCM_8”
“TLS_PSK_WITH_AES_256_CCM”
“TLS_PSK_WITH_AES_256_CBC_SHA384”
“TLS_PSK_WITH_AES_256_CBC_SHA”
“TLS_PSK_WITH_AES_128_GCM_SHA256”
“TLS_PSK_WITH_AES_128_CCM_8”
“TLS_PSK_WITH_AES_128_CCM”
“TLS_PSK_WITH_AES_128_CBC_SHA256”
“TLS_PSK_WITH_AES_128_CBC_SHA”
“TLS_PSK_WITH_3DES_EDE_CBC_SHA”
“TLS_KRB5_WITH_IDEA_CBC_SHA”
“TLS_KRB5_WITH_3DES_EDE_CBC_SHA”
“TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384”
“TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384”
“TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256”
“TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256”
“TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384”
“TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384”
“TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256”
“TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256”
“TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384”
“TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384”
“TLS_ECDH_RSA_WITH_AES_256_CBC_SHA”
“TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256”
“TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256”
“TLS_ECDH_RSA_WITH_AES_128_CBC_SHA”
“TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA”
“TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384”
“TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256”
“TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384”
“TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256”
“TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384”
“TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA”
“TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256”
“TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA”
“TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA”
“TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384”
“TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256”
“TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384”
“TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256”
“TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384”
“TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA”
“TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256”
“TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA”
“TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA”
“TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384”
“TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256”
“TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384”
“TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256”
“TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384”
“TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA”
“TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256”
“TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA”
“TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA”
“TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384”
“TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384”
“TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256”
“TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256”
“TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384”
“TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384”
“TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256”
“TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256”
“TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384”
“TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384”
“TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA”
“TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256”
“TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256”
“TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA”
“TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA”
“TLS_DH_RSA_WITH_SEED_CBC_SHA”
“TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384”
“TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256”
“TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA”
“TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256”
“TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256”
“TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA”
“TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384”
“TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384”
“TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256”
“TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256”
“TLS_DH_RSA_WITH_AES_256_GCM_SHA384”
“TLS_DH_RSA_WITH_AES_256_CBC_SHA256”
“TLS_DH_RSA_WITH_AES_256_CBC_SHA”
“TLS_DH_RSA_WITH_AES_128_GCM_SHA256”
“TLS_DH_RSA_WITH_AES_128_CBC_SHA256”
“TLS_DH_RSA_WITH_AES_128_CBC_SHA”
“TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA”
“TLS_DHE_RSA_WITH_SEED_CBC_SHA”
“TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256”
“TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA”
“TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256”
“TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA”
“TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384”
“TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256”
“TLS_DHE_RSA_WITH_AES_256_CBC_SHA256”
“TLS_DHE_RSA_WITH_AES_256_CBC_SHA”
“TLS_DHE_RSA_WITH_AES_128_CBC_SHA256”
“TLS_DHE_RSA_WITH_AES_128_CBC_SHA”
“TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA”
“TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384”
“TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256”
“TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384”
“TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256”
“TLS_DHE_PSK_WITH_AES_256_CBC_SHA384”
“TLS_DHE_PSK_WITH_AES_256_CBC_SHA”
“TLS_DHE_PSK_WITH_AES_128_CBC_SHA256”
“TLS_DHE_PSK_WITH_AES_128_CBC_SHA”
“TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA”
“TLS_DHE_DSS_WITH_SEED_CBC_SHA”
“TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256”
“TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA”
“TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256”
“TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA”
“TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384”
“TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256”
“TLS_DHE_DSS_WITH_AES_256_CBC_SHA256”
“TLS_DHE_DSS_WITH_AES_256_CBC_SHA”
“TLS_DHE_DSS_WITH_AES_128_CBC_SHA256”
“TLS_DHE_DSS_WITH_AES_128_CBC_SHA”
“TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA”
“TLS_DH_DSS_WITH_SEED_CBC_SHA”
“TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384”
“TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256”
“TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA”
“TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256”
“TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256”
“TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA”
“TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384”
“TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384”
“TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256”
“TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256”
“TLS_DH_DSS_WITH_AES_256_GCM_SHA384”
“TLS_DH_DSS_WITH_AES_256_CBC_SHA256”
“TLS_DH_DSS_WITH_AES_256_CBC_SHA”
“TLS_DH_DSS_WITH_AES_128_GCM_SHA256”
“TLS_DH_DSS_WITH_AES_128_CBC_SHA256”
“TLS_DH_DSS_WITH_AES_128_CBC_SHA”
“TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA”
)
$SuitesEnabled = @()
foreach($CSuite in $WeakCiphers){
Foreach ($CS in (Get-TlsCipherSuite -Name $CSuite)) {Disable-TlsCipherSuite -Name $CS.name}
}

Disable all weak TLS Cipher Suites

Verschlüsselungssuites mit der Powershell verwalten

In diesem Dokument suchen wir nach unsicheren Ciphersuiten, lassen uns die Eigenschaften anzeigen und deaktivieren anschließend die unsicheren Suiten.

Verwaltung von Ciphersuiten

Recommended Cipher Suites 2022

Die in dieser Liste empfohlenden Cipher Suiten für TLS v1.2 können bedenkenlos eingesetzt werden.

Die Excelliste enthält ebenso die korrespondierenden OpenSSL Cipher Suites sowie weitere wichtige Details zur Anwendung.