> From: Philip Guenther [mailto:[email protected]]
> To: Stuart VanZee
> Cc: Openbsd Misc (E-mail)
> Subject: Re: ssl v2 question
>
>
> On Wed, Feb 4, 2009 at 6:21 AM, Stuart VanZee
> <[email protected]> wrote:
> ...
> > So the question is.  How do I prove that our https server doesn't
> > provide support for sslv2?
>
> First, you disable it per Otto's email.  Then, you run a
> script like this:
>
> #!/bin/sh
> openssl ciphers -v |
> while read cipher version other; do
>         printf 'HEAD / HTTP/1.0\n\n' |
>         openssl s_client -connect 127.0.0.1:443 -cipher $cipher \
>                          -ssl${version##*v} -quiet 2>&1 |
>         grep HTTP >/dev/null && echo $version $cipher
> done
>
>
> That'll report the SSL protocol version and cipher suite combos that
> it supports for the root page.  (In openssl, the cipher suites for TLS
> are the same as for SSLv3, so that script only reports SSLv3 for
> both.)
>
>
> Philip Guenther
>

Thank you everyone for the replies.  With the information provided
by Marc Espie, Otto Moerbeek, Dennis Davis, Philip Guenther and a
few others I was able to get my https server configured correctly
and as a bonus, I was able to find enough info that I was able to
understand what I was doing rather that just blindly following a
how-to or someone's directions.  I ended up with:

SSLProtocol all -SSLv2
SSLCipherSuite HIGH:MEDIUM

As the settings in httpd.conf and was able to verify the results
using the script that was provided by Philip.

Again, thank you all for the wonderful help.

s

Reply via email to