1 |
Thank you. With the setting below in httpd.conf |
2 |
|
3 |
SSLProtocol all -SSLv2 -SSLv3 |
4 |
SSLCipherSuite |
5 |
EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH+aRSA+RC4:EECDH:EDH+aRSA:DES-CBC3-SHA:!RC4:!ECDHE-RSA-DES-CBC3-SHA:!aNULL:!eNULL:!LOW:3DES:!MD5:!EXP:!PSK:!SRP:!DSS |
6 |
|
7 |
and in vhosts.conf with: |
8 |
NameVirtualHost *:443 |
9 |
... |
10 |
Header set Strict-Transport-Security "max-age=31536000; includeSubDomains" |
11 |
... |
12 |
|
13 |
I get "A+" rating, so I think should be OK |
14 |
|
15 |
Certificate 100 |
16 |
Protocol Support 95 |
17 |
Key Exchange 80 |
18 |
Cipher Strength 90 |
19 |
|
20 |
-- |
21 |
Joseph |
22 |
|
23 |
|
24 |
On 06/22/14 09:55, Mick wrote: |
25 |
>On Sunday 22 Jun 2014 02:29:44 Joseph wrote: |
26 |
>> Before upgrading to apache 2.2.27 I had this line in httpd.conf |
27 |
>> SSLProtocol -ALL +SSLv3 +TLSv1 +TLSv1.2 |
28 |
>> SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:!LOW:!SSLv2:!EXPORT |
29 |
>> |
30 |
>> and I was getting "A-" rating from: www.ssllabs.com |
31 |
>> |
32 |
>> Now after upgrading to apache-2.2.27 I'm getting "C" because of weak Cipher |
33 |
>> Strength inclusion: |
34 |
>> |
35 |
>> TLS_RSA_EXPORT_WITH_RC4_40_MD5 (0x3) WEAK 40 |
36 |
>> TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (0x6) WEAK 40 |
37 |
>> TLS_RSA_EXPORT_WITH_DES40_CBC_SHA (0x8) WEAK 40 |
38 |
>> TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA (0x14) DH 512 bits (p: 64, g: 1, |
39 |
>> Ys: 64) FS WEAK 40 TLS_RSA_WITH_DES_CBC_SHA (0x9) WEAK 56 |
40 |
>> TLS_DHE_RSA_WITH_DES_CBC_SHA (0x15) DH 1024 bits (p: 128, g: 1, Ys: 128) |
41 |
>> FS WEAK 56 |
42 |
>> |
43 |
>> How to get rid of it? I've tired setting in 00_default_ssl_vhost.conf |
44 |
>> |
45 |
>> SSLProtocol all -SSLv2 -SSLv3 |
46 |
> |
47 |
>It should be better to set -ALL to disable all protocols and then explicitly |
48 |
>enable only the protocols that you want to trust as secure, e.g. +TLSv1.2 |
49 |
> |
50 |
>> SSLCompression Off |
51 |
>> SSLCipherSuite "EECDH+AESGCM EDH+AESGCM EECDH -RC4 EDH -CAMELLIA -SEED |
52 |
>> !aNULL !eNULL !LOW !3DES !MD5 !EXP !PSK !SRP !DSS !RC4" |
53 |
> |
54 |
>This leaves the anonymous DH enabled which will give you a poor rating. |
55 |
> |
56 |
>> or |
57 |
>> SSLProtocol -ALL +SSLv3 +TLSv1 +TLSv1.2 |
58 |
>> SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:!LOW:!SSLv2:!EXPORT |
59 |
> |
60 |
>This enables RC4 which may give you a poor rating - not sure. Better you move |
61 |
>it down the list so that more secure ciphers are tried first. |
62 |
> |
63 |
>> nothing helps, I'm still getting "C" because of weak Cipher Strength |
64 |
>> inclusion. |
65 |
> |
66 |
>This is because you inadvertently allow weak ciphers in your directives above. |
67 |
> |
68 |
>Try running openssl ciphers -v <string> to see what your directives allow and |
69 |
>in what order. Then modify them accordingly. |
70 |
> |
71 |
>HTH. |
72 |
>-- |
73 |
>Regards, |
74 |
>Mick |