Backported to 2.2 and 2.4. For additional rational of not changing any
already-configured servers, but preventing new 2.2/2.4 configuration
deployments from supporting 3DES, please see the OpenSSL project's
own observations first, before launching into discussion;
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
On Tue, May 16, 2017 at 2:33 PM, wrote:
> Author: wrowe
> Date: Tue May 16 19:33:36 2017
> New Revision: 1795358
>
> URL: http://svn.apache.org/viewvc?rev=1795358&view=rev
> Log:
> Remove 3DES by default for users of older crypto librarys; the cipher
> has been reclassified in current OpenSSL releases as WEAK due to 112
> or fewer bits of remaining cipher strength, while the Sweet32 disclosure
> extended the criticism of RC4 on to 3DES. (IDEA, which potentially has the
> same issue, is never enabled by default in OpenSSL, due to patent concerns.)
>
> This commit does not change default httpd behavior, but alters the suggested
> behavior of newly provisioned httpd servers. Where adopted, XP with IE8 will
> no longer handshake with mod_ssl (previously, XP with IE6 would not
> handshake.)
> The same net effect occurs where OpenSSL is updated to 1.1.0.
>
> Modified:
> httpd/httpd/trunk/docs/conf/extra/httpd-ssl.conf.in
>
> Modified: httpd/httpd/trunk/docs/conf/extra/httpd-ssl.conf.in
> URL:
> http://svn.apache.org/viewvc/httpd/httpd/trunk/docs/conf/extra/httpd-ssl.conf.in?rev=1795358&r1=1795357&r2=1795358&view=diff
> ==
> --- httpd/httpd/trunk/docs/conf/extra/httpd-ssl.conf.in (original)
> +++ httpd/httpd/trunk/docs/conf/extra/httpd-ssl.conf.in Tue May 16 19:33:36
> 2017
> @@ -49,8 +49,8 @@ Listen @@SSLPort@@
> # ensure these follow appropriate best practices for this deployment.
> # httpd 2.2.30, 2.4.13 and later force-disable aNULL, eNULL and EXP
> ciphers,
> # while OpenSSL disabled these by default in 0.9.8zf/1.0.0r/1.0.1m/1.0.2a.
> -SSLCipherSuite HIGH:MEDIUM:!MD5:!RC4
> -SSLProxyCipherSuite HIGH:MEDIUM:!MD5:!RC4
> +SSLCipherSuite HIGH:MEDIUM:!MD5:!RC4:!3DES
> +SSLProxyCipherSuite HIGH:MEDIUM:!MD5:!RC4:!3DES
>
> # By the end of 2016, only TLSv1.2 ciphers should remain in use.
> # Older ciphers should be disallowed as soon as possible, while the
>
>