On Tue, May 5, 2015 at 3:19 AM,  <wr...@apache.org> wrote:
> Author: wrowe
> Date: Tue May  5 01:19:20 2015
> New Revision: 1677721
>
> URL: http://svn.apache.org/r1677721
[]
> Modified: httpd/httpd/branches/2.2.x/docs/conf/extra/httpd-ssl.conf.in
> URL: 
> http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/docs/conf/extra/httpd-ssl.conf.in?rev=1677721&r1=1677720&r2=1677721&view=diff
> ==============================================================================
> --- httpd/httpd/branches/2.2.x/docs/conf/extra/httpd-ssl.conf.in (original)
> +++ httpd/httpd/branches/2.2.x/docs/conf/extra/httpd-ssl.conf.in Tue May  5 
> 01:19:20 2015
> @@ -49,6 +49,24 @@ Listen @@SSLPort@@
[]
> +#   SSL Cipher Suite:
> +#   List the ciphers that the client is permitted to negotiate.
> +#   See the mod_ssl documentation for a complete list.
> +SSLCipherSuite HIGH:MEDIUM:!aNULL:!MD5
> +
> +#   Speed-optimized SSL Cipher configuration:
> +#   If speed is your main concern (on busy HTTPS servers e.g.),
> +#   you might want to force clients to specific, performance
> +#   optimized ciphers. In this case, prepend those ciphers
> +#   to the SSLCipherSuite list, and enable SSLHonorCipherOrder.
> +#   Caveat: by giving precedence to RC4-SHA and AES128-SHA
> +#   (as in the example below), most connections will no longer
> +#   have perfect forward secrecy - if the server's key is
> +#   compromised, captures of past or future traffic must be
> +#   considered compromised, too.
> +#SSLCipherSuite RC4-SHA:AES128-SHA:HIGH:MEDIUM:!aNULL:!MD5

There possibly should be ":!EXP" in both suites above.
Also I'd suggest removing RC4 from the latter suite, it is not
considered secure ([1]), and maybe replace it with "AES128-SHA256"
(both secure and fast with SNI).

Ideally, we probably should merge r1526168 and r1527291 from trunk.

[1] http://www.isg.rhul.ac.uk/tls/

Reply via email to