On Wed, 26 Nov 2014, Michael Rasmussen wrote:

http://ssllabs.com

Excellent tool. Thank you.

If nothing else comes out of this the report from ssllabs provided lots of food for thought.

A couple months ago, I ran its test against both madboa.com and servers at work. It was a very helpful tool, not only for web services but also for thinking about how some of those vulnerabilities might be present in other SSL-protected services like SMTP/AUTH and IMAP.

I ended up changing cipher and/or protocol lists for Apache:

SSLCipherSuite HIGH:MEDIUM:!IDEA:!aNULL:!eNULL:!MD5:!ADH:!EXP
SSLHonorCipherOrder on
SSLProtocol +TLSv1.2 +TLSv1.1 +TLSv1

and Dovecot:

ssl_cipher_list = HIGH:!IDEA:!aNULL:!eNULL:!MD5:!ADH:!EXP

and Sendmail:

LOCAL_CONFIG
O CipherList=HIGH:!IDEA:!aNULL:!eNULL:!MD5:!ADH:!EXP
O ClientSSLOptions=+SSL_OP_NO_SSLv2 +SSL_OP_NO_SSLv3
O ServerSSLOptions=+SSL_OP_NO_SSLv2 +SSL_OP_NO_SSLv3 
+SSL_OP_CIPHER_SERVER_PREFERENCE

Google for "nmap --script ssl-enum-ciphers" for another helpful tool to sniff out SSL-related weaknesses.

--
Paul Heinlein
[email protected]
45°38' N, 122°6' W
_______________________________________________
PLUG mailing list
[email protected]
http://lists.pdxlinux.org/mailman/listinfo/plug

Reply via email to