How to check and enumerate ciphers used by TLS/SSL on Linux?

Is there any fix for ssl medium strength cipher suites supported (sweet32) vulnerabilities for version 2021.10?

Issue description:

How to check and enumerate ciphers used by TLS/SSL on Linux?

Resolution:

1.) Install nmap package with command:

# yum install nmap

2,) Then, run below command to list TLS/SSL

# nmap --script ssl-enum-ciphers -p

Example output:

[root@ ~]# nmap --script ssl-enum-ciphers -p 6443 localhost

Starting Nmap 7.70 ( https://nmap.org ) at 2024-07-19 01:29 UTC

Nmap scan report for localhost (127.0.0.1)

Host is up (0.000089s latency).

Other addresses for localhost (not scanned): ::1

PORT STATE SERVICE

6443/tcp open sun-sr-https

| ssl-enum-ciphers:

| TLSv1.2:

| ciphers:

| TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A

| TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A

| TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A

| compressors:

| NULL

| cipher preference: client

|_ least strength: A

Nmap done: 1 IP address (1 host up) scanned in 0.64 seconds