Juniper交换机漏洞CVE-2008-5161

Juniper交换机漏洞CVE-2008-5161_第1张图片

1.Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

All Junos software releases built on or after 2010-06-25 have been modified to prefer CTR modes. Releases containing the fix specifically include: 8.5S9, 9.3S12, 10.0S6.1, 10.0R4, 10.1S3.1, 10.1R3, 10.2S1, 10.2R2 and all subsequent releases (i.e. all releases built after 10.2R2).
So, this issue is not affected in versions after 10.2R2.

2.Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

Please check the fingerprint-hash (md5 | sha2-256) parameter in the following documentation, sha2-256 is used by default

你可能感兴趣的:(『实战-精华篇』,Juniper,juniper漏洞修复)