[Letsencrypt-devel] Please consider changing options-ssl-apache.conf

Silke Meyer silke at silkemeyer.net
Sat Oct 15 15:22:57 UTC 2016


Hi, I'm new here.

First, I'd like to thank you for working on the L.E. client for Debian!

I'm writing to you because of the Apache SSL configuration the Let's
Encrypt package does:

The python-letsencrypt-apache package automatically includes a sample
config called "options-ssl-apache.conf".

I ran an SSL/TLS checker against a website with that SSL config. It got
an F rating on Cryptcheck [1] where the triple-DES cipher is considered
fatal as of CVE-2016-2183. [2][3]

I compared with the recommendations Mozilla gives in the SSL config
generator for an Apache 2.4.18 / OpenSSL 1.0.2g site that is considered
not too strict. Results are in [4].

I suppose that people who have their Apache configuration done by the
letsencrypt client might not dive into ciphers etc. That's why I propose
to change the sample config to a "best effort" secure default.

My git diff is below - only that I didn't know where to submit it in
this alioth thingy.

Please consider this!
Thanks and kind regards,

Silke

Links:
[1] https://tls.imirhil.fr/
[2] https://www.openssl.org/blog/blog/2016/08/24/sweet32/
[3]
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
[4]
https://mozilla.github.io/server-side-tls/ssl-config-generator/?server=apache-2.4.18&openssl=1.0.2g&hsts=no&profile=intermediate

--- snip ---

diff --git a/certbot_apache/options-ssl-apache.conf
b/certbot_apache/options-ssl-apache.conf
index ec07a4b..ec6a68a 100644
--- a/certbot_apache/options-ssl-apache.conf
+++ b/certbot_apache/options-ssl-apache.conf
@@ -3,10 +3,11 @@
 SSLEngine on

 # Intermediate configuration, tweak to your needs
-SSLProtocol             all -SSLv2 -SSLv3
-SSLCipherSuite
ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA
+SSLProtocol             all -SSLv3
+SSLCipherSuite
ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
 SSLHonorCipherOrder     on
 SSLCompression          off
+SSLSessionTickets off

 SSLOptions +StrictRequire

@@ -20,3 +21,9 @@ LogFormat "%v %h %l %u %t \"%r\" %>s %b" vhost_common

 # Always ensure Cookies have "Secure" set (JAH 2012/1)
 #Header edit Set-Cookie (?i)^(.*)(;\s*secure)??((\s*;)?(.*)) "$1;
Secure$3$4"
+
+# recommended: OCSP Stapling
+# SSLUseStapling          on
+# SSLStaplingResponderTimeout 5
+# SSLStaplingReturnResponderErrors off
+# SSLStaplingCache        shmcb:/var/run/ocsp(128000)

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.alioth.debian.org/pipermail/letsencrypt-devel/attachments/20161015/35cd354f/attachment.sig>


More information about the Letsencrypt-devel mailing list