Summary: | www-servers/apache: upgrade TLS protocols in 00_default_ssl_vhost.conf | ||
---|---|---|---|
Product: | Gentoo Linux | Reporter: | Tomáš Mózes <hydrapolic> |
Component: | Current packages | Assignee: | Apache Team - Bugzilla Reports <apache-bugs> |
Status: | CONFIRMED --- | ||
Severity: | normal | CC: | apache-bugs, sam |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Tomáš Mózes
2020-06-12 13:35:43 UTC
Ping (In reply to Tomáš Mózes from comment #0) > ## SSLHonorCipherOrder: > # Prefer the server's cipher preference order as the client may have > a > # weak default order. > - SSLHonorCipherOrder On > + SSLHonorCipherOrder Off > > ## Server Certificate: > # Point SSLCertificateFile at a PEM encoded certificate. If the > certificate Why do you flip this one? (In reply to Lars Wendler (Polynomial-C) from comment #2) > (In reply to Tomáš Mózes from comment #0) > > ## SSLHonorCipherOrder: > > # Prefer the server's cipher preference order as the client may have > > a > > # weak default order. > > - SSLHonorCipherOrder On > > + SSLHonorCipherOrder Off > > > > ## Server Certificate: > > # Point SSLCertificateFile at a PEM encoded certificate. If the > > certificate > > Why do you flip this one? By default it's disabled https://httpd.apache.org/docs/current/mod/mod_ssl.html#sslhonorcipherorder And also here https://ssl-config.mozilla.org/#server=apache&version=2.4.41&config=intermediate&openssl=1.1.1d&hsts=false&ocsp=false&guideline=5.6 Seems like it's only enabled for "old" mozilla ssl profile (not for intermediate nor modern). It is better to let the client choose the cipher based on its capabilities, for example because the client doesn't have AES hardware capabilities and CHACHA20 may be a better choice. This should only be done when all ciphers are considered strong enough, but that is the case with this patch. I'm wondering if we should keep the DHE-* ciphers at all. They don't add any additional value (since the ECDHE-* ciphers will be used in most cases) and the DH part is beginning to be suspect and starting to pop up in reports now. Our default configuration matches mozilla-old configuration suggestions, if there is no strong reason we should upgrade to something more up to date. I believe mozilla's intermediate level is a good start. |