Backported to 2.2 and 2.4. For additional rational of not changing any
already-configured servers, but preventing new 2.2/2.4 configuration
deployments from supporting 3DES, please see the OpenSSL project's
own observations first, before launching into discussion;
On Tue, May 16, 2017 at 2:33 PM, <wr...@apache.org> wrote:
> Author: wrowe
> Date: Tue May 16 19:33:36 2017
> New Revision: 1795358
> URL: http://svn.apache.org/viewvc?rev=1795358&view=rev
> Remove 3DES by default for users of older crypto librarys; the cipher
> has been reclassified in current OpenSSL releases as WEAK due to 112
> or fewer bits of remaining cipher strength, while the Sweet32 disclosure
> extended the criticism of RC4 on to 3DES. (IDEA, which potentially has the
> same issue, is never enabled by default in OpenSSL, due to patent concerns.)
> This commit does not change default httpd behavior, but alters the suggested
> behavior of newly provisioned httpd servers. Where adopted, XP with IE8 will
> no longer handshake with mod_ssl (previously, XP with IE6 would not
> The same net effect occurs where OpenSSL is updated to 1.1.0.
> Modified: httpd/httpd/trunk/docs/conf/extra/httpd-ssl.conf.in
> --- httpd/httpd/trunk/docs/conf/extra/httpd-ssl.conf.in (original)
> +++ httpd/httpd/trunk/docs/conf/extra/httpd-ssl.conf.in Tue May 16 19:33:36
> @@ -49,8 +49,8 @@ Listen @@SSLPort@@
> # ensure these follow appropriate best practices for this deployment.
> # httpd 2.2.30, 2.4.13 and later force-disable aNULL, eNULL and EXP
> # while OpenSSL disabled these by default in 0.9.8zf/1.0.0r/1.0.1m/1.0.2a.
> -SSLCipherSuite HIGH:MEDIUM:!MD5:!RC4
> -SSLProxyCipherSuite HIGH:MEDIUM:!MD5:!RC4
> +SSLCipherSuite HIGH:MEDIUM:!MD5:!RC4:!3DES
> +SSLProxyCipherSuite HIGH:MEDIUM:!MD5:!RC4:!3DES
> # By the end of 2016, only TLSv1.2 ciphers should remain in use.
> # Older ciphers should be disallowed as soon as possible, while the