Hi, I'm new here. First, I'd like to thank you for working on the L.E. client for Debian!
I'm writing to you because of the Apache SSL configuration the Let's Encrypt package does: The python-letsencrypt-apache package automatically includes a sample config called "options-ssl-apache.conf". I ran an SSL/TLS checker against a website with that SSL config. It got an F rating on Cryptcheck [1] where the triple-DES cipher is considered fatal as of CVE-2016-2183. [2][3] I compared with the recommendations Mozilla gives in the SSL config generator for an Apache 2.4.18 / OpenSSL 1.0.2g site that is considered not too strict. Results are in [4]. I suppose that people who have their Apache configuration done by the letsencrypt client might not dive into ciphers etc. That's why I propose to change the sample config to a "best effort" secure default. My git diff is below - only that I didn't know where to submit it in this alioth thingy. Please consider this! Thanks and kind regards, Silke Links: [1] https://tls.imirhil.fr/ [2] https://www.openssl.org/blog/blog/2016/08/24/sweet32/ [3] https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/ [4] https://mozilla.github.io/server-side-tls/ssl-config-generator/?server=apache-2.4.18&openssl=1.0.2g&hsts=no&profile=intermediate --- snip --- diff --git a/certbot_apache/options-ssl-apache.conf b/certbot_apache/options-ssl-apache.conf index ec07a4b..ec6a68a 100644 --- a/certbot_apache/options-ssl-apache.conf +++ b/certbot_apache/options-ssl-apache.conf @@ -3,10 +3,11 @@ SSLEngine on # Intermediate configuration, tweak to your needs -SSLProtocol all -SSLv2 -SSLv3 -SSLCipherSuite ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA +SSLProtocol all -SSLv3 +SSLCipherSuite ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS SSLHonorCipherOrder on SSLCompression off +SSLSessionTickets off SSLOptions +StrictRequire @@ -20,3 +21,9 @@ LogFormat "%v %h %l %u %t \"%r\" %>s %b" vhost_common # Always ensure Cookies have "Secure" set (JAH 2012/1) #Header edit Set-Cookie (?i)^(.*)(;\s*secure)??((\s*;)?(.*)) "$1; Secure$3$4" + +# recommended: OCSP Stapling +# SSLUseStapling on +# SSLStaplingResponderTimeout 5 +# SSLStaplingReturnResponderErrors off +# SSLStaplingCache shmcb:/var/run/ocsp(128000)
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Letsencrypt-devel mailing list Letsencrypt-devel@lists.alioth.debian.org https://lists.alioth.debian.org/mailman/listinfo/letsencrypt-devel