From mboxrd@z Thu Jan 1 00:00:00 1970 From: IT Superhack To: development@lists.ipfire.org Subject: Re: [PATCH] apache: generating unique prime numbers and forbit use of weak DH cipher suites Date: Wed, 03 Jun 2015 10:27:33 +0200 Message-ID: <556EBA75.1040005@web.de> In-Reply-To: <1433267218.3370.246.camel@ipfire.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============2080122516982156679==" List-Id: --===============2080122516982156679== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Hello Michael, I tested a bit in the last hours. There were a few issues I discovered and I had to change my patch. First, the prime number generation is much slower than I expected - it took up to 20 minutes on my system. (I guess I had a lucky moment when I wrote the last mail to you...) Second, Apache seems to ignore the DH prime numbers. On https://weakdh.org/sysadmin.html it says that Apache 2.4.8 or newer is required for the "SSLOpenSSLConfCmd" option. I have therefore decided to switch DH off, and use ECDHE only, which is more safe and - by the way - faster than DH. This is not a problem, because modern browsers support ECDHE, except for some exotic clients such as Android 2.3.7 and Java Client 6u45. And yes, you were right: The DES-suites were ignored. Please see the new cipher list in the patch below. In my opinion, the patch is now ready for merging, unless you have someting against it. Signed-off-by: Timmothy Wilson --- diff --git a/config/httpd/vhosts.d/ipfire-interface-ssl.conf b/config/httpd/vhosts.d/ipfire-interface-ssl.conf index daac757..a8bbae7 100644 --- a/config/httpd/vhosts.d/ipfire-interface-ssl.conf +++ b/config/httpd/vhosts.d/ipfire-interface-ssl.conf @@ -9,7 +9,7 @@ TransferLog /var/log/httpd/access_log SSLEngine on SSLProtocol all -SSLv2 -SSLv3 - SSLCipherSuite ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GC= M-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES1= 28-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:E= CDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDS= A-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SH= A256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-A= ES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128:AES25= 6:HIGH:!RC4:!aNULL:!eNULL:!EXPORT:!DES:!3DES:!MD5:!PSK + SSLCipherSuite ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GC= M-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES1= 28-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:E= CDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDS= A-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:AES128-GCM-SHA256= :AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:CAMELLIA:HIGH:!DH:!LOW:!aNULL:= !eNULL:!EXPORT:!3DES:!DES:!RC4:!MD5:!PSK:!aECDH SSLHonorCipherOrder on SSLCertificateFile /etc/httpd/server.crt SSLCertificateKeyFile /etc/httpd/server.key Sorry for my harsh words in my last mail about pseudonyms and this stuff. Best regards, Timmothy Wilson --===============2080122516982156679== Content-Type: application/pgp-signature Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="signature.asc" MIME-Version: 1.0 LS0tLS1CRUdJTiBQR1AgU0lHTkFUVVJFLS0tLS0KCmlRRWNCQUVCQ2dBR0JRSlZicnA5QUFvSkVP eUxhMUM1RWF6citPb0gvQStQdjRrMjdTU29wNVZjR0hGRXJwVE4KYStyQ0JEUDZwenpoWHpYMFVK cEJqZ2xtQmFKbE5CSE1HdkpmbU8rVFlKUTRzSEVyYVdobDhqVVh0WU9PQWs3MwpkdG9Qbk55ZWNi blA2SUo0Z2ZtNkV2YWIrRFlaMWVEMTNvV29vZXR2djV6Z05tTmIwcGRxbFM1UGVSSnV1R2xPCnZs R3Z4NE9IUzJTekt6bEVuYUFUYzgvOGtmTUk0dTlXNU54eFFiNk85VWpJUkJwbENxY25CV0hEMGxm V0JiQXYKS2dXVFpBM0RlNFlYbTV6a0ZmZVFpTUhjQjFBRVA1WjRSS2dCOU4vWlluOVRvUEdxOThP Q2ZNZFRlYnZNT1NmTApNd3dON2hIbXI2dnZIeFErZGl1M0lVZ1ZaR0w3b3dvQWFNQjExKzM0TThQ Wk5kUWVTRVV6Tlg2N2VhaDgwVnM9Cj1QaDRDCi0tLS0tRU5EIFBHUCBTSUdOQVRVUkUtLS0tLQo= --===============2080122516982156679==--