Return-Path: X-Original-To: archive-asf-public-internal@cust-asf2.ponee.io Delivered-To: archive-asf-public-internal@cust-asf2.ponee.io Received: from cust-asf.ponee.io (cust-asf.ponee.io [163.172.22.183]) by cust-asf2.ponee.io (Postfix) with ESMTP id 666E7200BD8 for ; Wed, 7 Dec 2016 12:56:36 +0100 (CET) Received: by cust-asf.ponee.io (Postfix) id 6517C160B0A; Wed, 7 Dec 2016 11:56:36 +0000 (UTC) Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by cust-asf.ponee.io (Postfix) with SMTP id 86D3D160AFD for ; Wed, 7 Dec 2016 12:56:35 +0100 (CET) Received: (qmail 27738 invoked by uid 500); 7 Dec 2016 11:56:34 -0000 Mailing-List: contact users-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: users@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list users@httpd.apache.org Received: (qmail 27728 invoked by uid 99); 7 Dec 2016 11:56:34 -0000 Received: from pnap-us-west-generic-nat.apache.org (HELO spamd3-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 07 Dec 2016 11:56:34 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd3-us-west.apache.org (ASF Mail Server at spamd3-us-west.apache.org) with ESMTP id B45DD18397F for ; Wed, 7 Dec 2016 11:56:33 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd3-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: -1 X-Spam-Level: X-Spam-Status: No, score=-1 tagged_above=-999 required=6.31 tests=[HTML_MESSAGE=2, RP_MATCHES_RCVD=-2.999, SPF_PASS=-0.001] autolearn=disabled Received: from mx1-lw-us.apache.org ([10.40.0.8]) by localhost (spamd3-us-west.apache.org [10.40.0.10]) (amavisd-new, port 10024) with ESMTP id MEnZfbN1TNPF for ; Wed, 7 Dec 2016 11:56:31 +0000 (UTC) Received: from www2.jsidata.ca (www.jsidata.ca [209.87.229.110]) by mx1-lw-us.apache.org (ASF Mail Server at mx1-lw-us.apache.org) with ESMTP id 6E0A65F27E for ; Wed, 7 Dec 2016 11:56:31 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by www2.jsidata.ca (Postfix) with ESMTP id EDCBC37F0DB for ; Wed, 7 Dec 2016 06:56:24 -0500 (EST) X-Virus-Scanned: amavisd-new at jsidata.ca Received: from www2.jsidata.ca ([127.0.0.1]) by localhost (smtp.jsidata.ca [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L9TakzkVW4Oy for ; Wed, 7 Dec 2016 06:56:23 -0500 (EST) Received: from server1.jsidata.ca (server1.jsidata.ca [192.168.200.11]) by www2.jsidata.ca (Postfix) with ESMTP id 0BA4537F08A for ; Wed, 7 Dec 2016 06:56:23 -0500 (EST) Received: from [192.168.200.69] (dbc.jsidata.ca [192.168.200.69]) by server1.jsidata.ca (Postfix) with ESMTP id E07DA4530A for ; Wed, 7 Dec 2016 06:56:22 -0500 (EST) To: users@httpd.apache.org References: From: David Copeland Organization: JSI Data Systems Limited Message-ID: <85050b1f-b3d1-ce7a-66ea-8535a3cb91fe@jsidata.ca> Date: Wed, 7 Dec 2016 06:56:22 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.5.0 MIME-Version: 1.0 In-Reply-To: Content-Type: multipart/alternative; boundary="------------13CBD0AE4DCC1E5B8BFE7669" Subject: Re: [users@httpd] SSLCipherSuite and SSL Key Exchange archived-at: Wed, 07 Dec 2016 11:56:36 -0000 --------------13CBD0AE4DCC1E5B8BFE7669 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Try the configuration tool at https://mozilla.github.io/server-side-tls/ssl-config-generator/ . Dave. On 07/12/16 06:19 AM, Tea Wrex wrote: > I have been using the Qualys SSL Labs SSL Server Test > to test my SSL > implementation. It scores an SSL server using the criteria located in > the SSL Server Rating Guide > . I'm trying > to make the SSL as secure as possible. I have a 4096 bit certificate. > My server currently gets an A+ rating because I have enabled HTTP > Strict Transport Security (HSTS) with long duration. (More info on > correctly configuring SSL can be found here > .) > > > What I am trying to do is get the /Key Exchange/ and /Cipher Strength/ > scores to be 100 percent. I already have a 100 percent grade for the > /Certificate/ and/Protocol Support/ scores. > > I have no idea how to fix the /Key Exchange/ score, so I need help > with that. > > I have been trying to change the /Cipher Strength/ score by playing > with different variations of /SSLCipherSuite/. > > This is my current setting for /SSLCipherSuite/: > > SSLCipherSuite ECHD:!aNULL:!NULL:!eNULL:!MEDIUM:!LOW:!MD5:!RC4 > > It says in the Apache manual under /SSLCipherSuite/ that MEDIUM is > "all ciphers with 128 bit encryption." However, when I have set > !MEDIUM (as shown above) it does not remove the 128bit ciphers as they > are still listed in the test results. I have tried various settings > but cannot seem to remove the 128 bit ciphers.I also tried -MEDIUM but > that did not work either. > > Thanks in advance for any help you can give, > > Tea > > -- David Copeland JSI Data Systems Limited 613-727-9353 www.jsidata.ca --------------13CBD0AE4DCC1E5B8BFE7669 Content-Type: text/html; charset=utf-8 Content-Transfer-Encoding: 7bit
Try the configuration tool at https://mozilla.github.io/server-side-tls/ssl-config-generator/ .

Dave.

On 07/12/16 06:19 AM, Tea Wrex wrote:
I have been using the Qualys SSL Labs SSL Server Test to test my SSL implementation. It scores an SSL server using the criteria located in the SSL Server Rating Guide. I'm trying to make the SSL as secure as possible. I have a 4096 bit certificate. My server currently gets an A+ rating because I have enabled HTTP Strict Transport Security (HSTS) with long duration. (More info on correctly configuring SSL can be found here.)


What I am trying to do is get the Key Exchange and Cipher Strength scores to be 100 percent. I already have a 100 percent grade for the Certificate and Protocol Support scores.

I have no idea how to fix the Key Exchange score, so I need help with that.

I have been trying to change the Cipher Strength score by playing with different variations of SSLCipherSuite.

This is my current setting for SSLCipherSuite:

SSLCipherSuite ECHD:!aNULL:!NULL:!eNULL:!MEDIUM:!LOW:!MD5:!RC4

It says in the Apache manual under SSLCipherSuite that MEDIUM is "all ciphers with 128 bit encryption." However, when I have set !MEDIUM (as shown above) it does not remove the 128bit ciphers as they are still listed in the test results. I have tried various settings but cannot seem to remove the 128 bit ciphers.I also tried -MEDIUM but that did not work either.

Thanks in advance for any help you can give,

Tea




-- 
David Copeland
JSI Data Systems Limited
613-727-9353
www.jsidata.ca
--------------13CBD0AE4DCC1E5B8BFE7669--