| Summary: | SSL support needs to be improved | ||
|---|---|---|---|
| Product: | Websites | Reporter: | Olivier Delaune <olivier.delaune> |
| Component: | All | Assignee: | Sysadmin Team <sysadmin-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Atelier Team <atelier-bugs> |
| Severity: | enhancement | ||
| Priority: | Normal | CC: | bjarne.thomsen, doktor5000, filip.komar, makowski.mageia |
| Version: | trunk | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Source RPM: | CVE: | ||
| Status comment: | |||
|
Description
Olivier Delaune
2014-07-02 19:39:22 CEST
Olivier Delaune
2014-07-02 19:39:32 CEST
Summary:
SSL support needs to be improvec =>
SSL support needs to be improved
Manuel Hiebel
2014-07-02 20:37:43 CEST
Assignee:
atelier-bugs =>
sysadmin-bugs A new test gives now * This server is vulnerable to the POODLE attack. If possible, disable SSL 3 to mitigate. Grade capped to C. MORE INFO » * This server does not mitigate the CRIME attack. Grade capped to B. * Certificate uses SHA1 and expires after 2016. Upgrade to SHA256 as soon as possible to avoid browser warnings. MORE INFO » * The server supports only older protocols, but not the current best TLS 1.2. Grade capped to B. * The server does not support Forward Secrecy with the reference browsers. MORE INFO » In these conditions, I think it is really dangerous to keep the https version of mageia.org: users think their communication with mageia.org are protected which is not really the case... Few months after, it gives * This server is vulnerable to the POODLE attack. If possible, disable SSL 3 to mitigate. Grade capped to C. MORE INFO » Certificate has a weak signature and expires after 2016. Upgrade to SHA2 to avoid browser warnings. MORE INFO » * This server accepts the RC4 cipher, which is weak. Grade capped to B. MORE INFO » * The server does not support Forward Secrecy with the reference browsers. MORE INFO » * This site works only in browsers with SNI support. * This server supports TLS_FALLBACK_SCSV to prevent protocol downgrade attacks. Briefly, it is a bit better, but there is still this POODLE attack vulnerability... For apache, using these settings would help :
SSLVerifyClient none
SSLProtocol +TLSv1.2 +TLSv1.1 +TLSv1
SSLHonorCipherOrder on
SSLCipherSuite ALL:!aNULL:!eNULL:!LOW:!EXP:!RC4:!3DES:+HIGH:+MEDIUM
and also :
Header add Strict-Transport-Security "max-age=15768000;includeSubDomains"CC:
(none) =>
makowski.mageia According to ssllabs site Overall Rating is now declared as A. Status:
NEW =>
RESOLVED |