Bug #2082

Ostel's SSL config is not so hot

Added by n8fr8 over 4 years ago. Updated about 4 years ago.

Status:FeedbackStart date:10/15/2013
Priority:NormalDue date:10/18/2013
Assignee:lee% Done:

0%

Category:-Spent time:-
Target version:-
Component:

Description

Please review the issues on this site: https://www.ssllabs.com/ssltest/analyze.html?d=ostel.co

and resolve.

History

#1 Updated by lee over 4 years ago

  • Priority changed from High to Normal

I went over some threat modeling on IRC and it looks like the consequences of this static analysis is not critical, though a "nice to have".

#2 Updated by lee over 4 years ago

Removing SSLv2 (thus isolating us from the hordes of IE 6 users) seems to make the pretty charts more green

Followed this reference

http://wiki.nginx.org/HttpSslModule#ssl_ciphers

I have no idea what the 40/100 score for Key Exchange means and the document doesn't reference the criteria for scoring. It's just like getting a free credit score from Equifax!

#3 Updated by lee over 4 years ago

  • Status changed from New to Feedback

Alright, I got that random test site to give ostel.co an A. This officially removes all support for secure connections with IE6.

#4 Updated by DrWhax about 4 years ago

I use the following config:

listen 443 ssl ;
server_name ostel.nl;
add_header "Strict-Transport-Security" "max-age=86400";
ssl on;
ssl_certificate /lulz/server.crt;
ssl_certificate_key /lulz/server.key;
ssl_protocols SSLv3 TLSv1 TLSv1.1 TLSv1.2; # do this to disable SSLv2
ssl_ciphers "EECDH+ECDSA+AESGCM EECDH+aRSA+AESGCM EECDH+ECDSA+SHA384 \
EECDH+ECDSA+SHA256 EECDH+aRSA+SHA384 EECDH+aRSA+SHA256 \
EECDH EDH+aRSA EECDH+aRSA+RC4 eNULL 3DES EXP SRP !DSS";
ssl_prefer_server_ciphers on;

Also available in: Atom PDF