mirror of
https://github.com/fatedier/frp.git
synced 2026-05-15 08:05:49 -06:00
[GH-ISSUE #3973] 我们安装的FRPS服务被网络信息安全扫描出 TLS协议信息泄露漏洞(CVE-2016-2183),需要怎么解决? #3148
Labels
No labels
In Progress
WIP
WaitingForInfo
bug
doc
duplicate
easy
enhancement
future
help wanted
invalid
lifecycle/stale
need-issue-template
need-usage-help
no plan
proposal
pull-request
question
todo
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/frp#3148
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @zgh419566 on GitHub (Feb 3, 2024).
Original GitHub issue: https://github.com/fatedier/frp/issues/3973
Describe the feature request
我安装了frps服务,暴露在公网上,之前一直被信安通报主机已失陷(被攻击)
后面通过证书对报文做了TLS加密,终于可以正常使用
现在信安又通报存在TLS协议信息泄露漏洞(CVE-2016-2183),这种需要怎么解决?
信安的扫描图片如下

Describe alternatives you've considered
网上找到一篇对golang规避该漏洞的方法,供作者参考。
golang CVE-2016-2183漏洞,https需要添加tls设置加密算法CipherSuites白名单,将弱加密算法DES和3DES去掉。
Affected area
@zgh419566 commented on GitHub (Feb 6, 2024):
I fixed this issue
https://blog.csdn.net/zgh419566/article/details/136055490
orce frp use tls1.2 only when set TLS mode
avoid to use 3des algorithm
64-bit block cipher 3DES vulnerable to SWEET32 attack
user can scan it by nmap below:
nmap -sV -p 7000 --script ssl-enum-ciphers x.x.x.x
@PaperStrike commented on GitHub (Feb 22, 2024):
Go 1.17+ 应当已经把 DES 从安全套件列表剔除。所以只需要解决 go 为了兼容旧项目默认套件并非安全套件的问题,不需要每个上层开发者维护安全的算法列表。https://github.com/golang/go/issues/41476
@github-actions[bot] commented on GitHub (Mar 15, 2024):
Issues go stale after 21d of inactivity. Stale issues rot after an additional 7d of inactivity and eventually close.
@feipinxiang commented on GitHub (Jul 1, 2024):
frp目前版本0.58.1。只能自己修改代码重新打包是么?