]> TLD Linux GIT Repositories - packages/apache.git/blobdiff - apache-mod_ssl.conf
- Up to 2.4.52
[packages/apache.git] / apache-mod_ssl.conf
index cc1a2a2e07ef9d60001213af5558358fc4f17824..cf09e1dd3c98b442bb088b152084d998121041a7 100644 (file)
@@ -69,13 +69,32 @@ SSLProtocol all -SSLv3 -TLSv1 -TLSv1.1
 #   SSL Cipher Suite:
 #   List the ciphers that the client is permitted to negotiate.
 #   See the mod_ssl documentation for a complete list.
-SSLCipherSuite HIGH:!aNULL:!MD5:!3DES:!CAMELLIA128:!AES128:!RSA
+
+# High security: no weak ciphers, at least 256 bit
+# (except TLS_AES_128_GCM_SHA256 which is required by TLSv1.3)
+#SSLCipherSuite HIGH:!aNULL:!AES128:!ARIA128:!CAMELLIA128:!RSA:!SHA:!SHA256:!SHA384
+
+# If you don't care about TLSv1.3 requirements and don't want any 128 bit
+# cipher you can disable TLS_AES_128_GCM_SHA256 by uncommenting line below
+#SSLCipherSuite TLSv1.3 TLS_CHACHA20_POLY1305_SHA256:TLS_AES_256_GCM_SHA384
+
+# Strong security: no weak ciphers, at least 128 bit
+# Recommended setting if you are not paranoid
+SSLCipherSuite HIGH:!aNULL:!RSA:!SHA:!SHA256:!SHA384
+
+# Medium security: includes some weak ciphers, at least 256 bit
+# (except TLS_AES_128_GCM_SHA256 which is required by TLSv1.3)
+#SSLCipherSuite HIGH:!aNULL:!AES128:!ARIA128:!CAMELLIA128:!RSA
+
+# Low security: includes some weak ciphers, at least 128 bit
+#SSLCipherSuite HIGH:!aNULL:!RSA
+
 SSLHonorCipherOrder on
 SSLCompression off
 SSLSessionTickets off
 
 #   Use this command to generate 4096 DH parameters (it will take long time):
-#   openssl dhparam -out /etc//httpd/ssl/dhparams.pem 4096
+#   openssl dhparam -out /etc/httpd/ssl/dhparams.pem 4096
 #   When finished, uncomment line below
 #SSLOpenSSLConfCmd DHParameters /etc/httpd/ssl/dhparams.pem