It is becoming more and more common for IS departments to require that weak cryptography on their servers is disabled. The following is a list of crypto that is currently configured weak: SSL protocol version v2, v3 and PCT v1 Symmetric ciphers with keys shorter than 128bit Weak ciphers - like RC2, RC4 Weak hash functions - like MD5 Typically a Windows Server would be "hardened" following a procedure similar to that in this document - https://rootsecdev.medium.com/configuring-secure-cipher-suites-in-windows-server-2019-iis-7d1ff1ffe5ea It is more than likely that this requirement will affect Vault servers In light of this, Vault should be tested with, and certified to work with a typical, and documented hardened server
Show More