Hi, On 09.09.2014 15:08, pablo platt wrote: > rspadd Strict-Transport-Security:\ max-age=31536000;\ > includeSubDomains if ssl-proxy > > Do I need to add it to the frontend or backend? so its response, so better do it in the backend but it will work in the frontend too. > Will it break raw TLS (not HTTPS)? > Iam not sure what you are asking. Try it and check it via ssllabs?
> Thanks > cheers thomas > On Tue, Sep 9, 2014 at 1:25 PM, Thomas Heil > <[email protected] <mailto:[email protected]>> wrote: > > Hi, > > > On 09.09.2014 11:43, pablo platt wrote: >> I've tried both options and I'm still not getting A+. >> >> Unfortunately, I can't ask the user what the error is. >> If I'll run into this again, I'll try to get this info. >> > To reach A+ you need > > rspadd Strict-Transport-Security:\ max-age=31536000;\ > includeSubDomains if ssl-proxy > ssl-proxy means here the connection is ssl. > > and a cipher list like > -- > > EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384: > > > EECDH+aRSA+SHA256:EECDH+aRSA+RC4:EECDH:EDH+aRSA:RC4:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!RC4 > -- > > Together it should work. > > As you can see we have no longer RC4 ciphers, > > cheers > thomas > > >> Thanks >> >> On Mon, Sep 8, 2014 at 9:46 AM, Jarno Huuskonen >> <[email protected] <mailto:[email protected]>> wrote: >> >> Hi, >> >> On Sun, Sep 07, pablo platt wrote: >> > Hi, >> > >> > I'm using haproxy to terminate SSL and it works for most of >> my users. >> > I have alphassl wildcard certificate. >> > I'm using SSL to improve WebSockets and RTMP connections of >> port 443. >> > I don't have sensitive data or e-commerce. >> > >> > I have one user that see a warning in Chrome and can't use >> my website. >> >> Do you know what warning chrome gives to that user ? >> >> > Is it possible that this the warning is because an >> antivirus is not happy >> > with the default ciphers or other ssl settings? >> > >> > When running a test https://sslcheck.globalsign.com/en_US >> I'm getting: >> > Sessions may be vulnerable to BEAST attack >> > Server has not enabled HTTP Strict-Transport-Security >> > Server has SSL v3 enabled >> > Server is using RC4-based ciphersuites which have known >> vulnerabilities >> > Server configuration does not meet FIPS guidelines >> > Server does not have OCSP stapling configured >> > Server has not yet upgraded to a Extended Validation >> certificate >> > Server does not have SPDY enabled >> > >> > I found one suggestion: >> > bind 10.0.0.9:443 <http://10.0.0.9:443> name https ssl crt >> /path/to/domain.pem ciphers >> > RC4:HIGH:!aNULL:!MD5 >> > >> >> http://blog.haproxy.com/2013/01/21/mitigating-the-ssl-beast-attack-using-the-aloha-load-balancer-haproxy/ >> > >> > And another: >> > bind 0.0.0.0:443 <http://0.0.0.0:443> ssl crt /etc/cert.pem >> nosslv3 prefer-server-ciphers >> > ciphers RC4-SHA:AES128-SHA:AES256-SHA >> > >> > Both gives me other warnings. >> >> What other warnings ? (Does haproxy give you warnings/errors >> or client >> browsers) ? >> >> Perhaps you could try ciphersuite from: >> https://wiki.mozilla.org/Security/Server_Side_TLS >> >> for example in global: >> ssl-default-bind-ciphers ... >> >> or on bind: >> bind 0.0.0.0:443 <http://0.0.0.0:443> ssl crt /path/to/crt >> ciphers ... >> >> To enable ocsp stapling see haproxy config: >> http://cbonte.github.io/haproxy-dconv/configuration-1.5.html#5.1-crt >> >> http://cbonte.github.io/haproxy-dconv/configuration-1.5.html#9.2-set%20ssl%20ocsp-response >> >> -Jarno >> >> -- >> Jarno Huuskonen >>

