public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
From: "Peter Müller" <peter.mueller@link38.eu>
To: development@lists.ipfire.org
Subject: SSL/TLS changes in Apache
Date: Tue, 29 Aug 2017 16:23:48 +0200	[thread overview]
Message-ID: <20170829162348.0099f3b8.peter.mueller@link38.eu> (raw)

[-- Attachment #1: Type: text/plain, Size: 2879 bytes --]

Hello development list,

sorry for dropping in here.

Because I am an absolute newbie, I guess it might
be better to explain major changes before I submit
them in a patch.

The first section affected by this the SSL/TLS
configuration used by Apache. As far as I am concerned,
there are these issues at the moment:

(a) DH cipher suites
Because of several reasons, I would like to see them
disabled. First, they are more or less obsolete since
all modern User Agents (i.e. Web Browsers) does not
support them, they mostly use ECDHE instead. (Note that
this is valid for web sites only; other type of servers
- especially mail servers - are often maintained very
badly and therefore do not support anything better.)

Second, DH is much slower and needs more CPU time on
both server and client than ECDHE. While this not a
problem on up-to-date hardware, it might be an issue
for older systems.

Third, DH is vulnerable to LOGJAM, which is the most
important reason to disable it. Fixing LOGJAM is not
that easy since it would require
	i) Apache 2.4.x, which seems to be in development
	since some patches appeared here the other day
	ii) an individually created DH prime file, which
	takes usually more than 20 minutes and requires
	a huge amount of CPU time.
So, disabling the DH cipher suites would be a relatively
simple workaround.

(b) Cipher strength 
Currently, AES128 is preferred over AES265 nearly all the
time. Since I do not see any reason for this, I would
suggest to order them by strength.

(c) Unused ciphers
Further, there are many unused cipher suites listed (such
as SRP, DSS and PSK) which are not supported by any
modern browser - and probably never will. Thereof it might
make sense to remove them, since they cause the cipherlist
to be quite complex and hard to understand.

(d) Certificate dual-stack
At the first boot, IPFire generates an RSA host key for
Apache with a size of 4096 bits.

However, there is another key exchange algorithm, called
ECDSA. It has several advantages over RSA:
	i) Compared by key size, it is more secure. An
	ECDSA key with 256 bits provides the same strength
	as a RSA key with 3072 bits.
	ii) Key generation is much faster (384 bits should
	be sufficient for most applications, it equals about
	9216 bits RSA). Especially on slower hardware or
	systems without a HWRNG, this will accelerate the first
	boot.
	iii) It needs less CPU resources on both server and
	client than RSA. Again, this might be relevant for
	systems running on legacy hardware.
Since ECDSA and RSA can be used parallel (clients that do not
understand one key exchange algorithm use the other), I
suggest to generate an ECDSA key, too. Most modern User Agents
even prefer it over RSA.


What do you think of those? (If I made a mistake somewhere
- now or in the future -, I would be frightfully grateful for
feedback. :-) )

Best regards,
Peter Müller

             reply	other threads:[~2017-08-29 14:23 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-08-29 14:23 Peter Müller [this message]
     [not found] <1504193075.2584.45.camel@ipfire.org>
2017-09-02 11:54 ` Peter Müller
2017-09-04 12:23   ` Michael Tremer

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20170829162348.0099f3b8.peter.mueller@link38.eu \
    --to=peter.mueller@link38.eu \
    --cc=development@lists.ipfire.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox