Oracle Solaris Networking (MOSC)

MOSC Banner

Arcfour vulnerable?

edited Jun 25, 2016 5:00AM in Oracle Solaris Networking (MOSC) 3 commentsAnswered

Arcfour was removed from Oracle Solaris 11.3 SRU 5 release.

s arcfour vulnerable?

The default set of ciphers and MACs has been altered to remove unsafe algorithms. Beginning

with the Oracle Solaris 11.3 SRU 5 release, only the following ciphers and MACs are enabled

in the default configuration:

Ciphers

----

chacha20-poly1305@openssh.com

aes128-ctr

aes192-ctr

aes256-ctr

aes128-gcm@openssh.com

aes256-gcm@openssh.com

MACs

----

umac-64-etm@openssh.com

umac-128-etm@openssh.com

hmac-sha2-256-etm@openssh.com

hmac-sha2-512-etm@openssh.com

hmac-sha1-etm@openssh.com

umac-64@openssh.com

umac-128@openssh.com

hmac-sha2-256

hmac-sha2-512

hmac-sha1

Howdy, Stranger!

Log In

To view full details, sign in to My Oracle Support Community.

Register

Don't have a My Oracle Support Community account? Click here to get started.

Category Leaderboard

Top contributors this month

New to My Oracle Support Community? Visit our Welcome Center

MOSC Help Center