X-Git-Url: https://git.tld-linux.org/?p=packages%2Fapache.git;a=blobdiff_plain;f=apache-mod_ssl.conf;h=cf09e1dd3c98b442bb088b152084d998121041a7;hp=cc1a2a2e07ef9d60001213af5558358fc4f17824;hb=f13f85964fc303b8f372ee81cd9e141a25f0b8ad;hpb=c29d090fefac5d4cfdb754c15d33cbd11addd715 diff --git a/apache-mod_ssl.conf b/apache-mod_ssl.conf index cc1a2a2..cf09e1d 100644 --- a/apache-mod_ssl.conf +++ b/apache-mod_ssl.conf @@ -69,13 +69,32 @@ SSLProtocol all -SSLv3 -TLSv1 -TLSv1.1 # SSL Cipher Suite: # List the ciphers that the client is permitted to negotiate. # See the mod_ssl documentation for a complete list. -SSLCipherSuite HIGH:!aNULL:!MD5:!3DES:!CAMELLIA128:!AES128:!RSA + +# High security: no weak ciphers, at least 256 bit +# (except TLS_AES_128_GCM_SHA256 which is required by TLSv1.3) +#SSLCipherSuite HIGH:!aNULL:!AES128:!ARIA128:!CAMELLIA128:!RSA:!SHA:!SHA256:!SHA384 + +# If you don't care about TLSv1.3 requirements and don't want any 128 bit +# cipher you can disable TLS_AES_128_GCM_SHA256 by uncommenting line below +#SSLCipherSuite TLSv1.3 TLS_CHACHA20_POLY1305_SHA256:TLS_AES_256_GCM_SHA384 + +# Strong security: no weak ciphers, at least 128 bit +# Recommended setting if you are not paranoid +SSLCipherSuite HIGH:!aNULL:!RSA:!SHA:!SHA256:!SHA384 + +# Medium security: includes some weak ciphers, at least 256 bit +# (except TLS_AES_128_GCM_SHA256 which is required by TLSv1.3) +#SSLCipherSuite HIGH:!aNULL:!AES128:!ARIA128:!CAMELLIA128:!RSA + +# Low security: includes some weak ciphers, at least 128 bit +#SSLCipherSuite HIGH:!aNULL:!RSA + SSLHonorCipherOrder on SSLCompression off SSLSessionTickets off # Use this command to generate 4096 DH parameters (it will take long time): -# openssl dhparam -out /etc//httpd/ssl/dhparams.pem 4096 +# openssl dhparam -out /etc/httpd/ssl/dhparams.pem 4096 # When finished, uncomment line below #SSLOpenSSLConfCmd DHParameters /etc/httpd/ssl/dhparams.pem