On that note I thought I'd share the cipher suites we have been using:

kEECDH+ECDSA:kEECDH:kEDH:+SHA:-3DES:kRSA+3DES:!aNULL:!eNULL:!LOW:!MD5:!EXP:!DSS:!PSK:!SRP:!RC4:!SEED:!kECDH:!CAMELLIA

- avoids using RC4
- prefers forward secrecy for all browsers except those, which do not
support it
- no server-side mitigation of beast attack
- if java6 clients have to access the site, 1024bit dhparams have to be set


kEECDH+ECDSA:kEECDH:RC4:+AES+SHA:+RSA+RC4:!aNULL:!eNULL:!LOW:!MD5:!EXP:!DSS:!SRP:!PSK:!3DES:!SEED:!kECDH:!CAMELLIA

- server-side mitigation of beast attack, uses RC4 for older browsers though
- prefers forward secrecy for modern browsers


On Sat, Aug 2, 2014 at 12:19 AM, Christopher Schultz <
ch...@christopherschultz.net> wrote:

> Mark,
>
> On 8/1/14, 3:48 PM, Mark Thomas wrote:
> > On 01/08/2014 13:57, Rémy Maucherat wrote:
> >> Well, it can be disabled easily by reverting back to the old default in
> >> the endpoint. Sorry for all the defects, the code that was submitted was
> >> supposed to be fine ;)
> >
> > Thanks. I appreciate that.
> >
> >> If you think the feature is too complex and doesn't provide enough
> benefit,
> >> it can also be removed altogether.
> >
> > I'm still on the fence. I've removed the system property part as that
> > was changing the meaning of some aliases and that might cause a few
> > surprises.
> >
> > On balance I like the idea of the feature and having spent this week
> > getting it into shape I'm reluctant to just delete it.
> >
> > In terms of ensuring correct behaviour, we now have unit tests that
> > demonstrate that all the individual aliases are correct. Next I want to
> > test some more complex expressions to check the operators all behave as
> > expected.
>
> Here's one you can try on for size:
>
> !aNULL:!eNULL:!EXPORT:!DSS:!DES:!SSLv2:ECDHE:ECDH:DHE:AES256-GCM-SHA384:AES128-GCM-SHA256:+RC4:HIGH:MEDIUM
>
> I'm sure you can find more by googling for "httpd recommended
> CipherSuite" and see what kinds of crazy things people have been
> recommending to adjust things to get the "perfect" set of ciphers in
> whatever order ;)
>
> -chris
>
>

Reply via email to