Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

httpd: Use highest TLS versions server supports #33

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

xiongchiamiov
Copy link
Contributor

This is exactly the same change I made back in #9. However, it needs to be made once again because #16 went back to whitelisting versions, without any explanation of why this is better. I can, however, come up with several reasons why a blacklist is preferable:

  1. The config will be suitable for versions of Apache/OpenSSL that don't support TLS 1.1 and 1.2.
  2. Newer versions of TLS will be automatically enabled when supported. There is, practically speaking, no chance those will decrease, rather than increase, security.

This is exactly the same change I made back in ioerror#9.  However, it needs to be made once again because ioerror#16 went back to whitelisting versions, without any explanation of why this is better.  I can, however, come up with several reasons why a blacklist is preferable:

1. The config will be suitable for versions of Apache/OpenSSL that don't support TLS 1.1 and 1.2.
2. Newer versions of TLS will be automatically enabled when supported.  There is, practically speaking, *no* chance those will decrease, rather than increase, security.
@xiongchiamiov
Copy link
Contributor Author

I was reminded of this problem (which I pointed out ten months ago) when I saw this misconfiguration that would've been solved via protocol blacklisting instead of whitelisting.

I'd also like to note that the comments at the top of the file are woefully out of date (last changed in 2010!). However, specifying every combination of supported ciphers, particularly when it depends on the system, seems guaranteed to be out-dated (or just inaccurate!), so I left them as-is.

@diracdeltas
Copy link

Why not remove SSLv3 while you're at it?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants