Date: Wed, 2 May 2012 17:14:41 -0500 From: Mark Felder <feld@feld.me> To: freebsd-security@freebsd.org Subject: Re: OpenSSL and Heimdal Message-ID: <op.wdpb2rip34t2sn@tech304> In-Reply-To: <201205022201.50506.matt@chronos.org.uk> References: <CA%2BQLa9Asg0GkKKihhXLwpwOGz1T3u%2BJWhqo66L0M1denkeBq_Q@mail.gmail.com> <4FA12C1E.3030102@gmail.com> <201205022201.50506.matt@chronos.org.uk>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 02 May 2012 16:01:49 -0500, Matt Dawson <matt@chronos.org.uk> wrote: > mod_gnutls in ports. Setup is simple for Apache. Prefer the RC4 cipher > which secures SSLv3 against BEAST. This setup on my own HTTPS servers > passes Qualys' own tests with an A rating of 87 and tells me BEAST is > mitigated, although the thing still gives me an error on session > resumption which I know damned well works. It's all there for server > side in ports. Why go out of your way and use mod_gnutls? You can simply set your SSL settings like this: <IfModule ssl_module> SSLRandomSeed startup builtin SSLRandomSeed connect builtin SSLProtocol -ALL +SSLv3 +TLSv1 SSLHonorCipherOrder On SSLCipherSuite ECDHE-RSA-AES128-SHA256:AES128-GCM-SHA256:RC4:HIGH:!MD5:!aNULL:!EDH SetEnvIf User-Agent ".*MSIE.*" nokeepalive ssl-unclean-shutdown </IfModule> And now you have a rating of 85 and no BEAST issues.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?op.wdpb2rip34t2sn>