On Wed, Nov 04, 2015 at 05:03:29PM -0800, Prasun Gera wrote: > Thanks for the ticket information. I would still be interested in > configuring mod_nss properly (irrespective of whether the certs are ipa > generated or 3rd party). These are the worrying notes from ssllabs test: > > The server supports only older protocols, but not the current best TLS 1.2. > Grade capped to C. > This server accepts the RC4 cipher, which is weak. Grade capped to B. > The server does not support Forward Secrecy with the reference browsers. > Use the "Modern" cipher suite[1] recommended by Mozilla as a starting point. See also the "Cipher names correspondence table" on the same page for translating it to cipher names understood by NSS to construct a valid setting for the `NSSCipherSuite' directive.
[1] https://wiki.mozilla.org/Security/Server_Side_TLS#Modern_compatibility Cheers, Fraser > > On Wed, Nov 4, 2015 at 4:44 PM, Fraser Tweedale <[email protected]> wrote: > > > On Wed, Nov 04, 2015 at 03:20:22PM -0800, Prasun Gera wrote: > > > I'm using idm (4.1.x) on a RHEL 7.1 with the webui accessible publicly. > > I'm > > > using a stock configuration which uses the certs signed by ipa's CA for > > the > > > webui. This is mostly for convenience since it manages renewals > > seamlessly. > > > This, however, requires users to add the CA as trusted to their > > browsers. A > > > promising alternative to this is https://letsencrypt.org/, which issues > > > browser trusted certs, and will manage auto renewals too (in the future). > > > As a feature request, it would be nice to have closer integration between > > > ipa and the letsencrypt client which would make managing certs simple. > > I'm > > > about to set this up manually right now using the external ssl certs > > guide. > > > > > Let's Encrypt is on our radar. I like the idea of being able to > > install FreeIPA with publicly-trusted certs for HTTP and LDAP from > > the beginning. This would require some work in ipa-server-install > > in addition to certmonger support and a good, stable Let's Encrypt / > > ACME client implementation for Apache on Fedora. > > > > Installing publicly-trusted HTTP / LDAP certs is a common activity > > so I filed a ticket: https://fedorahosted.org/freeipa/ticket/5431 > > > > Cheers, > > Fraser > > > > > Secondly, since the webui uses mod_nss, how would one set it up to prefer > > > security over compatibility with older clients ? The vast majority of > > > documentation online (for eg. > > > https://mozilla.github.io/server-side-tls/ssl-config-generator/) is > > about > > > mod_ssl and I think the configuration doesn't transfer directly to > > mod_nss. > > > Since this is the only web facing component, I would like to set it up to > > > use stringent requirements. Right now, a test on > > > https://www.ssllabs.com/ssltest/ and https://weakdh.org/sysadmin.html > > > identifies > > > several issues. Since these things are not really my area of expertise, I > > > would like some documentation regarding this. Also, would manually > > > modifying any of the config files be overwritten by a yum update ? > > > > > -- > > > Manage your subscription for the Freeipa-users mailing list: > > > https://www.redhat.com/mailman/listinfo/freeipa-users > > > Go to http://freeipa.org for more info on the project > > > > -- Manage your subscription for the Freeipa-users mailing list: https://www.redhat.com/mailman/listinfo/freeipa-users Go to http://freeipa.org for more info on the project
