Here is my proposed global config for httpd.conf.in for 2.4 and 2.2, which
I believe mirrors the 'MUST' of RFC 7525. This includes restoring the
SSLProtocol -SSLv3 for 2.4 so that it is plainly visible, irrespective of
system defaults.

For trunk, I propose we drop TLSv1 and TLSv1.1 protocols and simply adopt
the recommended cipher list illustrated below (!SSLv3) in the default
extra/httpd-ssl.conf source, following the SHOULD recommendations.

Comments?

---

#   SSL Cipher Suite:
#   List the ciphers that the client is permitted to negotiate.
#   See the mod_ssl documentation for a complete list.
SSLCipherSuite HIGH:MEDIUM:!MD5:!RC4
SSLProxyCipherSuite HIGH:MEDIUM:!MD5:!RC4

#  Effective 2017, only TLSv1.2 ciphers should be in use.
#  Older ciphers should be disallowed as soon as possible, however
#  much older clients (such as IE6 SP2 on XP) may still be in use.
#  Replace the SSLCipherSuite and SSLProxyCipherSuite directives
#  above with these directives to restrict mod_ssl to TLSv1.2 ciphers
#  as soon as practical.
# SSLCipherSuite HIGH:MEDIUM:!SSLv3
# SSLProxyCipherSuite HIGH:MEDIUM:!SSLv3

#   As user agents such as web browsers are not configured for the user's
#   own preference of either security or performance, and in every case
#   this should be the prerogative of the web server administrator who must
#   manage cpu load, enforce server's preferred cipher order.
SSLHonorCipherOrder on

#   SSL Protocol support:
#   List the protocol versions which clients are allowed to connect with.
#   Disable SSLv2 and SSLv3 by default (cf. RFC 7525 3.1.1).  TLSv1 (1.0)
#   should be disabled as quickly as practical.  By 2017, only the TLSv1.2
#   protocol or later should remain in use.
SSLProtocol all -SSLv2 -SSLv3
SSLProxyProtocol all -SSLv2 -SSLv3


On Wed, May 6, 2015 at 4:32 AM, Steffen <i...@apachelounge.com> wrote:

> Maybe already known.
>
> The SSL/TLS best current practice RFC has been approved :
> https://www.rfc-editor.org/rfc/rfc7525.txt
>
> Steffen
>
>
>

Reply via email to