On Fri, Mar 15, 2013 at 6:42 PM, Steve Pribyl <spri...@viaforensics.com> wrote:
> I have recently come to support a OpenBSD e-commerce site have to pass PCI 
> DSS compliance.  It currently
> fails the BEAST attack scan because the server responds with vulnerable 
> ciphers.  I am looking for suggestions
> on remediating the problem.

1) TLS CBC cipher suites are subject to BEAST and Lucky 13 attacks
2) TLS RC4 cipher suites are subject to an initial bias attack** and
use only 128bits of key
3) the commonly deployed TLS 1.0 cipher suites use either CBC or RC4
4) TLS 1.1 and 1.2 client deployment may be insufficient to support
your customer base

So, which one will you bite the bullet on?

Personally, if I was managing a publicly faced secure web server, I
would pick (1) and sneer at the BEAST and Lucky 13 attacks and just
offer the 3DES and AES256 cipher suites.

** c.f. 
http://www.forbes.com/sites/andygreenberg/2013/03/13/cryptographers-show-mathematically-crackable-flaws-in-common-web-encryption/
for example


> Neither of these seem to actually turnoff the bad ciphers.
>
> SSLHonorCipherOrder On
> SSLCipherSuite RC4-SHA:HIGH:!ADH

If you want to never use a cipher suite, you need to never add it to
the list (which you do via "HIGH") or remove it completely via the '!'
operator and not add it back afterwards.

To test your attempts to get it to what you want, use the "openssl
ciphers -v" command, ala:
      openssl ciphers -v RC4-SHA:HIGH:!ADH


> SSLHonorCipherOrder On
> SSLCipherSuite 
> ECDHE-RSA-AES128-SHA256:AES128-GCM-SHA256:RC4:HIGH:!MD5:!aNULL:!EDH

You explicitly list "ECDHE-RSA-AES128-SHA256", which is a CBC cipher,
*first*!   What were you intending when you did that?

And then, of course, "HIGH" pulls in all the generic AES and 3DES
ciphers.  What were you intending when you included that?


> If there is not real problem I can accept that but I will need some real 
> statement so I can apply for an exemption.

c.f. (1) to (5) above and make your choice.


Philip Guenther

Reply via email to