thanks, applied to my rpmbuild and verified with ECDHE
calomel ssl validation in Firefox is happy with that
and 88% (until FF27 enables AES-GCM which leads to 100%)

without PFS it classifies the security with a red "weak"

Am 30.01.2014 16:59, schrieb Thomas Berger:
> Here is a working Patch against 4.1.2, should also work on 4.1.3.
> 
> Backportet from the 4.2.0 tree.
> 
> Am Donnerstag, 30. Januar 2014, 15:38:07 schrieb Reindl Harald:
>> Am 30.01.2014 15:19, schrieb Uri Shachar:
>>> On Thu, 30 Jan 2014 14:47:10 +0100 Reindl Harald wrote:
>>> snip...
>>>
>>>> one remaining issue currently is that DHE/ECDHE seems not to be supported
>>>> while httpd/openssl with the same environment do
>>>
>>> snip...
>>>
>>> Added in 4.2.0  - Check out https://issues.apache.org/jira/browse/TS-2372
>>
>> cool - thanks!
>>
>> hopefully the same way as httpd starting with 2.4.7
>> http://httpd.apache.org/docs/2.4/mod/mod_ssl.html#sslcertificatefile
>>
>>> DH parameter interoperability with primes > 1024 bit
>>> Beginning with version 2.4.7, mod_ssl makes use of standardized DH
>>> parameters with prime lengths of 2048, 3072 and 4096 bits (from RFC
>>> 3526), and hands them out to clients based on the length of the
>>> certificate's RSA/DSA key. With Java-based clients in particular (Java 7
>>> or earlier), this may lead to handshake failures - see this FAQ answer
>>> for working around such issues.
>>
>> means that if you have a RSA3072 DH-params are 3072, the same for 4096 etc.
>> and if someone want to control that he can add params to the used PEM file
>> and it could look like below containg all TSL relevant params/keys/certs
>>
>> [root@testserver:~]$ cat conf/ssl/testserver.rhsoft.net.pem
>> -----BEGIN CERTIFICATE-----
>> *snip*
>> -----END CERTIFICATE-----
>> -----BEGIN PRIVATE KEY-----
>> *snip*
>> -----END PRIVATE KEY-----
>> -----BEGIN DH PARAMETERS-----
>> MIIBiAKCAYEAsprp4BdLI4Vo8JcsJbu6/UJK+udAl3C1sHrBahXXdVxt6ArjbktI
>> up5BfGoiBfj28K0DiGSdXvnpDemaiJd29X+M7+XvJN6px0EP54aU+2Y+LeceI5WK
>> FBokp1wQFVG0f6ccNlXvoLec1iQLog+ygDT5m25yGKjfHTpRgJovoi5Jwoqtl0H+
>> XQ32oHh3/8IA1CjoWDkuHJGEWX6z26W9dTn9U4t9e0dIL+ulX6cQfkkJDSzwBgEs
>> y9jimihp73zu7hAIu/zNBMFWYswbZ4Z5SA1wENNRsO3nmBCekCjfKp0MuEJGQ/xx
>> U2Hrcd6UAPwTEjuWmBOi/DlAPQyLbTVDinBDfoZHsrl1Je1Hxwix4nsLsml0NoDw
>> i0jzihtOCoKiTuP7BWemZy2eKOqcRnu764bcFp8/l3klKWpuOH6Vd/7rfoe/FzQR
>> 8M8b5lTGTktjVPhZaRLe9lrHkVCa7MnPdHBK/JHvGBHsvGFQur4oQm5culCeQAxq
>> 0C/m6ck3xYTLAgEC
>> -----END DH PARAMETERS-----
>> -----BEGIN EC PARAMETERS-----
>> BgUrgQQAIg==
>> -----END EC PARAMETERS-----

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to