On 27.04.2010 05:19, Grant wrote: > I've been advised to harden my SSL in the following ways: > > 1. disable SSL 2.0
Agreed. There is no need to support SSL 2.0 anymore. > 2. disable use of SSL ciphers which offer either weak or no encryption For maximum compatibility, support AES, RC4 and 3DES (and up). There is no need to support weaker ciphers. > 3. disable anonymous SSL ciphers Correct. There is no need except in emergencies (actual interoperability problems with mandatory TLS destinations). But it should be the default anyway. In general, try to * use a private key that is at least 2048 bits long * do not offer ciphers below 128 bits * do not support SSLv2 * do not offer anonymous Deffie Hellmann (ADH) * generate new keys for each certificate (do not reuse keys) * support/offer TLS 1.0 and better -- Eray