Ok, so for Apache HTTPD something like this would do the job:

SSLProtocol             all -SSLv2 -SSLv3 -TLSv1
SSLCipherSuite          
ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!3DES:!MD5:!PSK
SSLHonorCipherOrder     on

I do not know how to do this for the CPVM java thingy that runs there; I think 
it's based on Jetty.

--
Sent from the Delta quadrant using Borg technology!

Nux!
www.nux.ro

----- Original Message -----
> From: "Erik Weber" <terbol...@gmail.com>
> To: "dev" <dev@cloudstack.apache.org>
> Sent: Monday, 9 March, 2015 09:34:08
> Subject: Re: New SSL vulnerability #FREAK

> On Mon, Mar 9, 2015 at 9:59 AM, Nux! <n...@li.nux.ro> wrote:
> 
>> BTW, the command I used is:
>>
>> nmap --script ssl-enum-ciphers $HOST
>>
>> I'm not entirely sure which cipher is good or not.
>>
> 
> Anyone with EXPORT in it is bad (in the FREAK case).
> 
> This is a scan of my 4.3.2 systemvm with nmap:
> 
>| ssl-enum-ciphers:
>|   SSLv3:
>|     ciphers:
>|       TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA - weak
>|       TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
>|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA - strong
>|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA - strong
>|       TLS_DHE_RSA_WITH_DES_CBC_SHA - weak
>|       TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
>|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
>|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA - strong
>|       TLS_ECDHE_RSA_WITH_RC4_128_SHA - strong
>|       TLS_RSA_EXPORT_WITH_DES40_CBC_SHA - weak
>|       TLS_RSA_EXPORT_WITH_RC4_40_MD5 - weak
>|       TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong
>|       TLS_RSA_WITH_AES_128_CBC_SHA - strong
>|       TLS_RSA_WITH_AES_256_CBC_SHA - strong
>|       TLS_RSA_WITH_DES_CBC_SHA - weak
>|       TLS_RSA_WITH_RC4_128_MD5 - strong
>|       TLS_RSA_WITH_RC4_128_SHA - strong
>|     compressors:
>|       NULL
>|   TLSv1.0:
>|     ciphers:
>|       TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA - weak
>|       TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
>|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA - strong
>|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA - strong
>|       TLS_DHE_RSA_WITH_DES_CBC_SHA - weak
>|       TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
>|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
>|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA - strong
>|       TLS_ECDHE_RSA_WITH_RC4_128_SHA - strong
>|       TLS_RSA_EXPORT_WITH_DES40_CBC_SHA - weak
>|       TLS_RSA_EXPORT_WITH_RC4_40_MD5 - weak
>|       TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong
>|       TLS_RSA_WITH_AES_128_CBC_SHA - strong
>|       TLS_RSA_WITH_AES_256_CBC_SHA - strong
>|       TLS_RSA_WITH_DES_CBC_SHA - weak
>|       TLS_RSA_WITH_RC4_128_MD5 - strong
>|       TLS_RSA_WITH_RC4_128_SHA - strong
> 
> --
> Erik

Reply via email to