Gentoo Archives: gentoo-user

From: Joseph <syscon780@×××××.com>
To: gentoo-user@l.g.o
Subject: Re: [gentoo-user] apache-2.2.27 disable SSLCipherSuite LOW 40 56 bit
Date: Sun, 22 Jun 2014 16:59:18
Message-Id: 20140622165928.GB9332@syscon7
In Reply to: Re: [gentoo-user] apache-2.2.27 disable SSLCipherSuite LOW 40 56 bit by Mick
1 Thank you. With the setting below in httpd.conf
2
3 SSLProtocol all -SSLv2 -SSLv3
4 SSLCipherSuite
5 EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH+aRSA+RC4:EECDH:EDH+aRSA:DES-CBC3-SHA:!RC4:!ECDHE-RSA-DES-CBC3-SHA:!aNULL:!eNULL:!LOW:3DES:!MD5:!EXP:!PSK:!SRP:!DSS
6
7 and in vhosts.conf with:
8 NameVirtualHost *:443
9 ...
10 Header set Strict-Transport-Security "max-age=31536000; includeSubDomains"
11 ...
12
13 I get "A+" rating, so I think should be OK
14
15 Certificate 100
16 Protocol Support 95
17 Key Exchange 80
18 Cipher Strength 90
19
20 --
21 Joseph
22
23
24 On 06/22/14 09:55, Mick wrote:
25 >On Sunday 22 Jun 2014 02:29:44 Joseph wrote:
26 >> Before upgrading to apache 2.2.27 I had this line in httpd.conf
27 >> SSLProtocol -ALL +SSLv3 +TLSv1 +TLSv1.2
28 >> SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:!LOW:!SSLv2:!EXPORT
29 >>
30 >> and I was getting "A-" rating from: www.ssllabs.com
31 >>
32 >> Now after upgrading to apache-2.2.27 I'm getting "C" because of weak Cipher
33 >> Strength inclusion:
34 >>
35 >> TLS_RSA_EXPORT_WITH_RC4_40_MD5 (0x3) WEAK 40
36 >> TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (0x6) WEAK 40
37 >> TLS_RSA_EXPORT_WITH_DES40_CBC_SHA (0x8) WEAK 40
38 >> TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA (0x14) DH 512 bits (p: 64, g: 1,
39 >> Ys: 64) FS WEAK 40 TLS_RSA_WITH_DES_CBC_SHA (0x9) WEAK 56
40 >> TLS_DHE_RSA_WITH_DES_CBC_SHA (0x15) DH 1024 bits (p: 128, g: 1, Ys: 128)
41 >> FS WEAK 56
42 >>
43 >> How to get rid of it? I've tired setting in 00_default_ssl_vhost.conf
44 >>
45 >> SSLProtocol all -SSLv2 -SSLv3
46 >
47 >It should be better to set -ALL to disable all protocols and then explicitly
48 >enable only the protocols that you want to trust as secure, e.g. +TLSv1.2
49 >
50 >> SSLCompression Off
51 >> SSLCipherSuite "EECDH+AESGCM EDH+AESGCM EECDH -RC4 EDH -CAMELLIA -SEED
52 >> !aNULL !eNULL !LOW !3DES !MD5 !EXP !PSK !SRP !DSS !RC4"
53 >
54 >This leaves the anonymous DH enabled which will give you a poor rating.
55 >
56 >> or
57 >> SSLProtocol -ALL +SSLv3 +TLSv1 +TLSv1.2
58 >> SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:!LOW:!SSLv2:!EXPORT
59 >
60 >This enables RC4 which may give you a poor rating - not sure. Better you move
61 >it down the list so that more secure ciphers are tried first.
62 >
63 >> nothing helps, I'm still getting "C" because of weak Cipher Strength
64 >> inclusion.
65 >
66 >This is because you inadvertently allow weak ciphers in your directives above.
67 >
68 >Try running openssl ciphers -v <string> to see what your directives allow and
69 >in what order. Then modify them accordingly.
70 >
71 >HTH.
72 >--
73 >Regards,
74 >Mick