Server has weaker ciphers enabled

Rule from ssl under security category

What is a trooper!

we have submitted your edit to the community for review! We'll review and make it live on the site in the next few hours, the internet thanks you :).

Browse another section of the knowledge base

Suggest an edit


This rule has no content... yet.

Add content to this rule

Or just browse to view rules that have content


As the waves of time continue and more exploits are found in older technology, so must we constantly review cipher suites used by our servers.

Older and weaker ciphers put servers at risk of explotation and must be disabled. The following ciphers are considered bad and must be disabled:

  • NULL
  • LOW
  • 3DES

How do I fix this ?

Configure your web server to disable these protocols (normally by negating them in the server), to get started here is a recommended list of ciphers supporting older clients till XP:


Take note of the negated ciphers:

  • !aNULL
  • !eNULL
  • !DES
  • !MD5
  • !PSK
  • !RC4

These are considered bad, and not matter which list of ciphers the server ends up using those must not be enabled.


Browse another section of the knowledge base

Signup icon
Ready to see how well your site scores?

Passmarked works best when you have an account. It allows you to keep a dashboard with saved data of the sites you have run through the system, we’ll alert you about important updates and you get access to the Passmarked Slack forum.

Sign up to get started