Dear Gustaf, I get the same A- grade: https://www.ssllabs.com/ssltest/analyze.html?d=cesareox.com (because of PFS)
My ciphers and protocols: ns_param ciphers "ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:ECDHE-RSA-RC4-SHA:ECDHE-ECDSA-RC4-SHA:AES128:AES256:RC4-SHA:HIGH:!aNULL:!eNULL:!EXPORT:!DES:!3DES:!MD5:!PSK" ns_param protocols "SSLv3, TLSv1" As seen on: https://wiki.mozilla.org/Security/Server_Side_TLS > openssl version OpenSSL 0.9.8y 5 Feb 2013 I've upgraded install-ns.sh (with_postgres=0) and work nice ;-) Thanks! Cesáreo --- side effect of using head version --- I was using 4.99.5 some days in my production server and I had some "Fatal: received fatal signal 11" Errors. But now It seems to work nicely. El 04/abril/14 15:19, Gustaf Neumann escribió: > Am 04.04.14 19:32, schrieb Cesáreo García Rodicio: >> Dear Gustaf, >> >> I had tried that (HEAD instead of 4.99.5) BUT not with most recent >> version from the repository ;-) >> >> But it didn't work (it keeps warning me about PFS). > Note that the nsssl driver does not implement PFS secrecy, but > configures OpenSSL to use it. > The achieved levels depend on the version of OpenSSL and the > configuration parameters > (mostly the configured ciphers) > > See, what we are using (without spending much time to get the perfect > values) > on next-scripting.org: > > https://www.ssllabs.com/ssltest/analyze.html?d=next-scripting.org > > ssllabs gives for this an A- ranking with protocol support 95%, but > complains > "The server does not support Forward Secrecy with the reference browsers". > > If one scrolls down to the "Handshake Simulation" section, one can see that > forward secrecy works with the used parameters on most browsers > except IE6+IE8 on Windows XP, YandexBot3.0 and Java; the latter fails, > since we > use DH paramters > 1024 bits. > > We are using the following parameters: > > ns_param ciphers > "ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:ECDHE-RSA-RC4-SHA:ECDHE-ECDSA-RC4-SHA:AES128:AES256:RC4-SHA:HIGH:!aNULL:!eNULL:!EXPORT:!DES:!3DES:!MD5:!PSK" > ns_param protocols "!SSLv2:!SSLv3" > > If someone comes of with a "better" cipher set, let us know. >> Silly Note about install-ns.sh >> I have postgres already installed so I remove "postgres and >> postgres-devel" in install-ns.sh. Perhaps it might be good idea to conf >> that via something like with_postgres=0 . > good idea. i've just now updated the install script in the wiki. > > > ------------------------------------------------------------------------------ > _______________________________________________ > naviserver-devel mailing list > naviserver-devel@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/naviserver-devel > ------------------------------------------------------------------------------ _______________________________________________ naviserver-devel mailing list naviserver-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/naviserver-devel