Am 14.08.2013 21:19, schrieb Robert Schetterer: >>> thx Harald, upgrading openssl to 1.x and using dove 2.2.5 is no option >>> at my setup lucid ubuntu yeter >> >> so you can practically forget it > > perhaps true forever, as long old clients are around, cause the server > can only workaround them
not absolutely playing around with the setings below and https://www.ssllabs.com/ssltest/ turned out that the order is what counts, and that is really tricky i played around 5 hours with this absoluetly crap adding !MEDIUM results in open from CRIME or BEAST attack because some clients chosse a vulerable cipher, but it would raise up the overall points of the test BUT at the same time perfect forward secrecry for most clients while with settings below only for Apple iOS/Safari without the -SHA1 also vulernable for one of the new attacks sorry, i refused to notice what and tried ot achive best possible encryption while not fall back to classification B what is important for security audits BEAST attack is unlikely in context mail IMHO this is all bullshit currently *but* if recent clients start to act smarter they can choose the best possible cipher offered from the server and after that you have your copmpatibility net for old clients - currently this all is a tragedy, but having PRISM/NSA and the latest news about in mind most likely recent clients will be able to choose a "perfect forward secrecy" capable cipher if offered by the server independent of weaker ones the real problem in your case will most likely be that most of the shiny new things in this area will require recent openssl and TLS1.2 (sadly not supproted by Mozilla/NSS for now) ________________________________________________________________________________________________ SSLProtocol All -SSLv2 -SSLv3 SSLCompression Off SSLInsecureRenegotiation Off SSLHonorCipherOrder On SSLCipherSuite EECDH+AES:EDH+AES:-SHA1:EECDH+RC4:EDH+RC4:RC4-SHA:EECDH+AES256:EDH+AES256:AES256-SHA:HIGH:!aNULL:!eNULL:!EXP:!LOW:!MD5
signature.asc
Description: OpenPGP digital signature