* [gentoo-user] apache-2.2.27 disable SSLCipherSuite LOW 40 56 bit
@ 2014-06-22 1:29 Joseph
2014-06-22 8:55 ` Mick
0 siblings, 1 reply; 3+ messages in thread
From: Joseph @ 2014-06-22 1:29 UTC (permalink / raw
To: gentoo-user
Before upgrading to apache 2.2.27 I had this line in httpd.conf
SSLProtocol -ALL +SSLv3 +TLSv1 +TLSv1.2
SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:!LOW:!SSLv2:!EXPORT
and I was getting "A-" rating from: www.ssllabs.com
Now after upgrading to apache-2.2.27 I'm getting "C" because of weak Cipher Strength inclusion:
TLS_RSA_EXPORT_WITH_RC4_40_MD5 (0x3) WEAK 40
TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (0x6) WEAK 40
TLS_RSA_EXPORT_WITH_DES40_CBC_SHA (0x8) WEAK 40
TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA (0x14) DH 512 bits (p: 64, g: 1, Ys: 64) FS WEAK 40
TLS_RSA_WITH_DES_CBC_SHA (0x9) WEAK 56
TLS_DHE_RSA_WITH_DES_CBC_SHA (0x15) DH 1024 bits (p: 128, g: 1, Ys: 128) FS WEAK 56
How to get rid of it? I've tired setting in 00_default_ssl_vhost.conf
SSLProtocol all -SSLv2 -SSLv3
SSLCompression Off
SSLCipherSuite "EECDH+AESGCM EDH+AESGCM EECDH -RC4 EDH -CAMELLIA -SEED !aNULL !eNULL !LOW !3DES !MD5 !EXP !PSK !SRP !DSS !RC4"
or
SSLProtocol -ALL +SSLv3 +TLSv1 +TLSv1.2
SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:!LOW:!SSLv2:!EXPORT
nothing helps, I'm still getting "C" because of weak Cipher Strength inclusion.
--
Joseph
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [gentoo-user] apache-2.2.27 disable SSLCipherSuite LOW 40 56 bit
2014-06-22 1:29 [gentoo-user] apache-2.2.27 disable SSLCipherSuite LOW 40 56 bit Joseph
@ 2014-06-22 8:55 ` Mick
2014-06-22 16:59 ` Joseph
0 siblings, 1 reply; 3+ messages in thread
From: Mick @ 2014-06-22 8:55 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: Text/Plain, Size: 1917 bytes --]
On Sunday 22 Jun 2014 02:29:44 Joseph wrote:
> Before upgrading to apache 2.2.27 I had this line in httpd.conf
> SSLProtocol -ALL +SSLv3 +TLSv1 +TLSv1.2
> SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:!LOW:!SSLv2:!EXPORT
>
> and I was getting "A-" rating from: www.ssllabs.com
>
> Now after upgrading to apache-2.2.27 I'm getting "C" because of weak Cipher
> Strength inclusion:
>
> TLS_RSA_EXPORT_WITH_RC4_40_MD5 (0x3) WEAK 40
> TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (0x6) WEAK 40
> TLS_RSA_EXPORT_WITH_DES40_CBC_SHA (0x8) WEAK 40
> TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA (0x14) DH 512 bits (p: 64, g: 1,
> Ys: 64) FS WEAK 40 TLS_RSA_WITH_DES_CBC_SHA (0x9) WEAK 56
> TLS_DHE_RSA_WITH_DES_CBC_SHA (0x15) DH 1024 bits (p: 128, g: 1, Ys: 128)
> FS WEAK 56
>
> How to get rid of it? I've tired setting in 00_default_ssl_vhost.conf
>
> SSLProtocol all -SSLv2 -SSLv3
It should be better to set -ALL to disable all protocols and then explicitly
enable only the protocols that you want to trust as secure, e.g. +TLSv1.2
> SSLCompression Off
> SSLCipherSuite "EECDH+AESGCM EDH+AESGCM EECDH -RC4 EDH -CAMELLIA -SEED
> !aNULL !eNULL !LOW !3DES !MD5 !EXP !PSK !SRP !DSS !RC4"
This leaves the anonymous DH enabled which will give you a poor rating.
> or
> SSLProtocol -ALL +SSLv3 +TLSv1 +TLSv1.2
> SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:!LOW:!SSLv2:!EXPORT
This enables RC4 which may give you a poor rating - not sure. Better you move
it down the list so that more secure ciphers are tried first.
> nothing helps, I'm still getting "C" because of weak Cipher Strength
> inclusion.
This is because you inadvertently allow weak ciphers in your directives above.
Try running openssl ciphers -v <string> to see what your directives allow and
in what order. Then modify them accordingly.
HTH.
--
Regards,
Mick
[-- Attachment #2: This is a digitally signed message part. --]
[-- Type: application/pgp-signature, Size: 490 bytes --]
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [gentoo-user] apache-2.2.27 disable SSLCipherSuite LOW 40 56 bit
2014-06-22 8:55 ` Mick
@ 2014-06-22 16:59 ` Joseph
0 siblings, 0 replies; 3+ messages in thread
From: Joseph @ 2014-06-22 16:59 UTC (permalink / raw
To: gentoo-user
Thank you. With the setting below in httpd.conf
SSLProtocol all -SSLv2 -SSLv3
SSLCipherSuite
EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH+aRSA+RC4:EECDH:EDH+aRSA:DES-CBC3-SHA:!RC4:!ECDHE-RSA-DES-CBC3-SHA:!aNULL:!eNULL:!LOW:3DES:!MD5:!EXP:!PSK:!SRP:!DSS
and in vhosts.conf with:
NameVirtualHost *:443
...
Header set Strict-Transport-Security "max-age=31536000; includeSubDomains"
...
I get "A+" rating, so I think should be OK
Certificate 100
Protocol Support 95
Key Exchange 80
Cipher Strength 90
--
Joseph
On 06/22/14 09:55, Mick wrote:
>On Sunday 22 Jun 2014 02:29:44 Joseph wrote:
>> Before upgrading to apache 2.2.27 I had this line in httpd.conf
>> SSLProtocol -ALL +SSLv3 +TLSv1 +TLSv1.2
>> SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:!LOW:!SSLv2:!EXPORT
>>
>> and I was getting "A-" rating from: www.ssllabs.com
>>
>> Now after upgrading to apache-2.2.27 I'm getting "C" because of weak Cipher
>> Strength inclusion:
>>
>> TLS_RSA_EXPORT_WITH_RC4_40_MD5 (0x3) WEAK 40
>> TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (0x6) WEAK 40
>> TLS_RSA_EXPORT_WITH_DES40_CBC_SHA (0x8) WEAK 40
>> TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA (0x14) DH 512 bits (p: 64, g: 1,
>> Ys: 64) FS WEAK 40 TLS_RSA_WITH_DES_CBC_SHA (0x9) WEAK 56
>> TLS_DHE_RSA_WITH_DES_CBC_SHA (0x15) DH 1024 bits (p: 128, g: 1, Ys: 128)
>> FS WEAK 56
>>
>> How to get rid of it? I've tired setting in 00_default_ssl_vhost.conf
>>
>> SSLProtocol all -SSLv2 -SSLv3
>
>It should be better to set -ALL to disable all protocols and then explicitly
>enable only the protocols that you want to trust as secure, e.g. +TLSv1.2
>
>> SSLCompression Off
>> SSLCipherSuite "EECDH+AESGCM EDH+AESGCM EECDH -RC4 EDH -CAMELLIA -SEED
>> !aNULL !eNULL !LOW !3DES !MD5 !EXP !PSK !SRP !DSS !RC4"
>
>This leaves the anonymous DH enabled which will give you a poor rating.
>
>> or
>> SSLProtocol -ALL +SSLv3 +TLSv1 +TLSv1.2
>> SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:!LOW:!SSLv2:!EXPORT
>
>This enables RC4 which may give you a poor rating - not sure. Better you move
>it down the list so that more secure ciphers are tried first.
>
>> nothing helps, I'm still getting "C" because of weak Cipher Strength
>> inclusion.
>
>This is because you inadvertently allow weak ciphers in your directives above.
>
>Try running openssl ciphers -v <string> to see what your directives allow and
>in what order. Then modify them accordingly.
>
>HTH.
>--
>Regards,
>Mick
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2014-06-22 16:59 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-06-22 1:29 [gentoo-user] apache-2.2.27 disable SSLCipherSuite LOW 40 56 bit Joseph
2014-06-22 8:55 ` Mick
2014-06-22 16:59 ` Joseph
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox