Hi Everyone,
I hope someone with more technical experience can answer the questions below.
I'm running Microsoft Network Monitor 3.4 on our TMG 2010 box and have the following filter to audit the TLS version levels as we intend to deprecate TLS 1.0
TLS.TlsRecLayer.TlsRecordLayer.SSLHandshake.HandShake.ClientHello
I note TlsRecordLayer stating TLS 1.0 initially, then SSL Handshake ClientHello TLS 1.2
Questions:
Based on the above has the communication established a TLS 1.0 or TLS 1.2 tunnel between the client and server?
What Cipher is it using as the trace does not indicate?
How is it possible to remove TLS 1.0/obsolete ciphers given clients using TLS 1.0 will always fail if we remove TLS 1.0/obsolete ciphers?
Thank you.
TLSSSLData: Transport Layer Security (TLS) Payload Data
TLS: TLS Rec Layer-1 HandShake: Client Hello.
TlsRecordLayer: TLS Rec Layer-1 HandShake:
ContentType: HandShake:
Version: TLS 1.0
Length: 512 (0x200)
SSLHandshake: SSL HandShake ClientHello(0x01)
HandShakeType: ClientHello(0x01)
ClientHello: TLS 1.2
Version: TLS 1.2
CipherSuitesLength: 34
TLSCipherSuites: Unknown Cipher
TLSCipherSuites: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 { 0xC0,0x2B }
TLSCipherSuites: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 { 0xC0,0x2F }
<other Ciphers>