I've got Apache in front of A4D. A few weeks ago I generated self-signed SSL certs for 3 virtual hosts on my development server. The institutional IT folks scanned the machine with Nessus or WebInspect over the weekend and dinged me for having week encryption ciphers enabled. By default Apache will enable every cipher suite. The result is the weak ones (40 bit) are exposed.

Here is the list of weak SSL ciphers supported by the remote server :

 Low Strength Ciphers (< 56-bit key)
   SSLv3
EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES(40) Mac=SHA1 export EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES(40) Mac=SHA1 export EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2(40) Mac=MD5 export EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export
   TLSv1
EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES(40) Mac=SHA1 export EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES(40) Mac=SHA1 export EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2(40) Mac=MD5 export EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export

The fields above are :

 {OpenSSL ciphername}
 Kx={key exchange}
 Au={authentication}
 Enc={symmetric encryption method}
 Mac={message authentication code}
{export flag}

I found various solutions for fixing this problem via Google and in an Apache book.

Basically you disable the ciphers via these directives.

SSLProtocol
SSLCipherSuite

The problems is I suspect the solutions I found aren't Mac OS X specific because when I restarted Apache after installing them things got very ugly. I've spent the day getting the server so it will start and back to where it was.

Has anyone here tackled this problem and if so would you mind sharing your settings?

Thanks,

Brad Perkins


_______________________________________________
Active4D-dev mailing list
[email protected]
http://mailman.aparajitaworld.com/mailman/listinfo/active4d-dev
Archives: http://mailman.aparajitaworld.com/archive/active4d-dev/

Reply via email to