Hi Robert, 2018-01-16 10:21 GMT+01:00 Robert S <robert.spam.me.sensel...@gmail.com>:
> Hi. > > I have run a server test on > https://cryptoreport.rapidssl.com/checker/views/certCheck.jsp. It > reports that my certificate is installed correctly but the server is > vulnerable to a BEAST attack. It says "Make sure you have the TLSv1.2 > protocol enabled on your server. Disable the RC4, MD5, and DES > algorithms. Contact your web server vendor for assistance." > > I believe that I have disabled these protocols - here are the relevant > lines in my config: > > SSLEngine on > SSLProtocol ALL -SSLv2 -SSLv3 > SSLCipherSuite "ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384: > ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256: > ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA- > AES256-SHA:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES128-SHA256: > ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE- > ECDSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256: > AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA:AES: > CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:! > PSK:!EDH:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3- > SHA:!KRB5-DES-CBC3-SHA" > SSLHonorCipherOrder On > > Can anyone help here? > IIRC a permanent solution for BEAST was to disable TLS 1.0, but I'd check https://mozilla.github.io/server-side-tls/ssl-config-generator/ and see how the above SSLCipherSuite setting can be changed to be up to date. Hope that helps, Luca