On Sunday 22 Jun 2014 02:29:44 Joseph wrote: > Before upgrading to apache 2.2.27 I had this line in httpd.conf > SSLProtocol -ALL +SSLv3 +TLSv1 +TLSv1.2 > SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:!LOW:!SSLv2:!EXPORT > > and I was getting "A-" rating from: www.ssllabs.com > > Now after upgrading to apache-2.2.27 I'm getting "C" because of weak Cipher > Strength inclusion: > > TLS_RSA_EXPORT_WITH_RC4_40_MD5 (0x3) WEAK 40 > TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (0x6) WEAK 40 > TLS_RSA_EXPORT_WITH_DES40_CBC_SHA (0x8) WEAK 40 > TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA (0x14) DH 512 bits (p: 64, g: 1, > Ys: 64) FS WEAK 40 TLS_RSA_WITH_DES_CBC_SHA (0x9) WEAK 56 > TLS_DHE_RSA_WITH_DES_CBC_SHA (0x15) DH 1024 bits (p: 128, g: 1, Ys: 128) > FS WEAK 56 > > How to get rid of it? I've tired setting in 00_default_ssl_vhost.conf > > SSLProtocol all -SSLv2 -SSLv3 It should be better to set -ALL to disable all protocols and then explicitly enable only the protocols that you want to trust as secure, e.g. +TLSv1.2 > SSLCompression Off > SSLCipherSuite "EECDH+AESGCM EDH+AESGCM EECDH -RC4 EDH -CAMELLIA -SEED > !aNULL !eNULL !LOW !3DES !MD5 !EXP !PSK !SRP !DSS !RC4" This leaves the anonymous DH enabled which will give you a poor rating. > or > SSLProtocol -ALL +SSLv3 +TLSv1 +TLSv1.2 > SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:!LOW:!SSLv2:!EXPORT This enables RC4 which may give you a poor rating - not sure. Better you move it down the list so that more secure ciphers are tried first. > nothing helps, I'm still getting "C" because of weak Cipher Strength > inclusion. This is because you inadvertently allow weak ciphers in your directives above. Try running openssl ciphers -v to see what your directives allow and in what order. Then modify them accordingly. HTH. -- Regards, Mick