How to disable SSLv2 and Weak Ciphers in Apache and IIS

My preferred Apache directives are:
  SSLProtocol ALL -SSLv2
  SSLCipherSuite ALL:!aNULL:!ADH:!eNULL:!NULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM

P.S.: the default Apache2 () SSL configuration in Debian Squeeze results in the exact same allowed cipher set:
SSLCipherSuite HIGH:MEDIUM:!ADH
I guess it relies on some defaults in mod_ssl which might differ in older Apache versions. So no problem if you're a bit overcautious and disable weak ciphers explicitly. Wink

Comments

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

TLSv1 might not cut it either ...

According to recent news reports, TLSv1 might come to its knees as well. I've already disabled it on the servers under my control. It's better to be safe than sorry ... Smile