[Letsencrypt-devel] Please consider changing options-ssl-apache.conf
Silke Meyer
silke at silkemeyer.net
Sat Oct 15 15:22:57 UTC 2016
Hi, I'm new here.
First, I'd like to thank you for working on the L.E. client for Debian!
I'm writing to you because of the Apache SSL configuration the Let's
Encrypt package does:
The python-letsencrypt-apache package automatically includes a sample
config called "options-ssl-apache.conf".
I ran an SSL/TLS checker against a website with that SSL config. It got
an F rating on Cryptcheck [1] where the triple-DES cipher is considered
fatal as of CVE-2016-2183. [2][3]
I compared with the recommendations Mozilla gives in the SSL config
generator for an Apache 2.4.18 / OpenSSL 1.0.2g site that is considered
not too strict. Results are in [4].
I suppose that people who have their Apache configuration done by the
letsencrypt client might not dive into ciphers etc. That's why I propose
to change the sample config to a "best effort" secure default.
My git diff is below - only that I didn't know where to submit it in
this alioth thingy.
Please consider this!
Thanks and kind regards,
Silke
Links:
[1] https://tls.imirhil.fr/
[2] https://www.openssl.org/blog/blog/2016/08/24/sweet32/
[3]
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
[4]
https://mozilla.github.io/server-side-tls/ssl-config-generator/?server=apache-2.4.18&openssl=1.0.2g&hsts=no&profile=intermediate
--- snip ---
diff --git a/certbot_apache/options-ssl-apache.conf
b/certbot_apache/options-ssl-apache.conf
index ec07a4b..ec6a68a 100644
--- a/certbot_apache/options-ssl-apache.conf
+++ b/certbot_apache/options-ssl-apache.conf
@@ -3,10 +3,11 @@
SSLEngine on
# Intermediate configuration, tweak to your needs
-SSLProtocol all -SSLv2 -SSLv3
-SSLCipherSuite
ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA
+SSLProtocol all -SSLv3
+SSLCipherSuite
ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
SSLHonorCipherOrder on
SSLCompression off
+SSLSessionTickets off
SSLOptions +StrictRequire
@@ -20,3 +21,9 @@ LogFormat "%v %h %l %u %t \"%r\" %>s %b" vhost_common
# Always ensure Cookies have "Secure" set (JAH 2012/1)
#Header edit Set-Cookie (?i)^(.*)(;\s*secure)??((\s*;)?(.*)) "$1;
Secure$3$4"
+
+# recommended: OCSP Stapling
+# SSLUseStapling on
+# SSLStaplingResponderTimeout 5
+# SSLStaplingReturnResponderErrors off
+# SSLStaplingCache shmcb:/var/run/ocsp(128000)
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.alioth.debian.org/pipermail/letsencrypt-devel/attachments/20161015/35cd354f/attachment.sig>
More information about the Letsencrypt-devel
mailing list