Backported to 2.2 and 2.4. For additional rational of not changing any
already-configured servers, but preventing new 2.2/2.4 configuration
deployments from supporting 3DES, please see the OpenSSL project's
own observations first, before launching into discussion;

  https://www.openssl.org/blog/blog/2016/08/24/sweet32/



On Tue, May 16, 2017 at 2:33 PM,  <wr...@apache.org> wrote:
> Author: wrowe
> Date: Tue May 16 19:33:36 2017
> New Revision: 1795358
>
> URL: http://svn.apache.org/viewvc?rev=1795358&view=rev
> Log:
> Remove 3DES by default for users of older crypto librarys; the cipher
> has been reclassified in current OpenSSL releases as WEAK due to 112
> or fewer bits of remaining cipher strength, while the Sweet32 disclosure
> extended the criticism of RC4 on to 3DES. (IDEA, which potentially has the
> same issue, is never enabled by default in OpenSSL, due to patent concerns.)
>
> This commit does not change default httpd behavior, but alters the suggested
> behavior of newly provisioned httpd servers. Where adopted, XP with IE8 will
> no longer handshake with mod_ssl (previously, XP with IE6 would not 
> handshake.)
> The same net effect occurs where OpenSSL is updated to 1.1.0.
>
> Modified:
>     httpd/httpd/trunk/docs/conf/extra/httpd-ssl.conf.in
>
> Modified: httpd/httpd/trunk/docs/conf/extra/httpd-ssl.conf.in
> URL: 
> http://svn.apache.org/viewvc/httpd/httpd/trunk/docs/conf/extra/httpd-ssl.conf.in?rev=1795358&r1=1795357&r2=1795358&view=diff
> ==============================================================================
> --- httpd/httpd/trunk/docs/conf/extra/httpd-ssl.conf.in (original)
> +++ httpd/httpd/trunk/docs/conf/extra/httpd-ssl.conf.in Tue May 16 19:33:36 
> 2017
> @@ -49,8 +49,8 @@ Listen @@SSLPort@@
>  #   ensure these follow appropriate best practices for this deployment.
>  #   httpd 2.2.30, 2.4.13 and later force-disable aNULL, eNULL and EXP 
> ciphers,
>  #   while OpenSSL disabled these by default in 0.9.8zf/1.0.0r/1.0.1m/1.0.2a.
> -SSLCipherSuite HIGH:MEDIUM:!MD5:!RC4
> -SSLProxyCipherSuite HIGH:MEDIUM:!MD5:!RC4
> +SSLCipherSuite HIGH:MEDIUM:!MD5:!RC4:!3DES
> +SSLProxyCipherSuite HIGH:MEDIUM:!MD5:!RC4:!3DES
>
>  #  By the end of 2016, only TLSv1.2 ciphers should remain in use.
>  #  Older ciphers should be disallowed as soon as possible, while the
>
>

Reply via email to