- drop SSL ciphers using RSA key exchange, they're now considered weak due to
not supporting forward secrecy
- disable session tickets to ensure forward secrecy is not compromised
# This directive can be used to control the SSL protocol flavors mod_ssl
# should use when establishing its server environment. Clients then can only
# connect with one of the provided protocols.
-SSLProtocol -all TLSv1.2
+SSLProtocol all -SSLv3 -TLSv1 -TLSv1.1
# SSL Cipher Suite:
# List the ciphers that the client is permitted to negotiate.
# See the mod_ssl documentation for a complete list.
-SSLCipherSuite HIGH:!aNULL:!MD5:!3DES:!CAMELLIA128:!AES128
-
+SSLCipherSuite HIGH:!aNULL:!MD5:!3DES:!CAMELLIA128:!AES128:!RSA
SSLHonorCipherOrder on
-
SSLCompression off
+SSLSessionTickets off
# Use this command to generate 4096 DH parameters (it will take long time):
# openssl dhparam -out /etc//httpd/ssl/dhparams.pem 4096