On Tuesday 01 September 2015 15:14:17 Andreas Thulin wrote:
> Hi misc readers!
> 
> This is my first attempt to ask for help using [email protected], so please
> bear with me if I'm making mistakes. Also, apologies if I'm asking about
> something recently discussed.
> 
> I want to limit the number of tls ciphers​ in httpd.conf so that only
> strong (>128 bit) ciphers with Forward Secrecy capabilities (ECDHE) are
> accepted. I'm also only using TLSv1.2.
> 
> My current httpd.conf contains a line saying
> 
> tls ciphers "STRONG:ECDHE:!aNULL:!SSLv3:@STRENGTH"

You could also just use secure (or default):

  tls ciphers "secure"

That will get you "TLSv1.2+AEAD+ECDHE:TLSv1.2+AEAD+DHE" (looks like I need to 
improve the documentation here...). DHE will be off by default, unless you also 
enable it via "tls dhe ..." (hint: there is a reason why it is off by default).

> which renders out "Configuration OK" with '# /usr/sbin/httpd -n'.
> Also, when testing that string using
> 
> # openssl ciphers -v 'STRONG:ECDHE:!aNULL:!SSLv3:@STRENGTH'
> 
> I get a nice, acceptable list of the ciphers. However, when running a
> server test
> (https://www.ssllabs.com/ssltest/analyze.html?d=andreasthulin.se),
> there's a much longer list of ciphers, including both non-FS and medium
> strength ciphers.
> 
> I'm thinking that either
> 
>    1. my assumption that my httpd.conf is all dandy is wrong (highly
>    probable),
>    2. SSL Labs is lying to me (improbable), or
>    3. there's some sort of bug in httpd (improbable).
> 
> Does anyone have any pointers?
>
> OpenBSD 5.8-current (GENERIC) #1095: Mon Aug 24. i386.
> 
> BR
> Andreas

Reply via email to