-
-
Notifications
You must be signed in to change notification settings - Fork 498
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Disable SSLHonorCipherOrder #247
base: master
Are you sure you want to change the base?
Conversation
It's recommended by https://ssl-config.mozilla.org/#server=apache&version=2.4.41&config=modern&openssl=1.1.1k&guideline=5.7 to disable SSLHonorCipherOrder.
This pr has been marked 'stale' due to lack of recent activity. If there is no further activity, the issue will be closed in another 30 days. Thank you for your contribution! Please read this blog post to see the reasons why I mark issues as stale. |
The PR is still required to match the recommendations by Mozilla. |
According to https://wiki.mozilla.org/Security/Server_Side_TLS#Modern_compatibility:
The Modern config is only meant for TLS versions/ciphers where all ciphers are strong/support forward secrecy. Setting a hardcoded |
I can make it configurable, but IMO it should be "secure by default". The TLS versions and ciphers in https://github.com/geerlingguy/ansible-role-apache/blob/master/defaults/main.yml should be updated as well, but in a different PR. |
This pr has been marked 'stale' due to lack of recent activity. If there is no further activity, the issue will be closed in another 30 days. Thank you for your contribution! Please read this blog post to see the reasons why I mark issues as stale. |
The PR is still required to match the recommendations by Mozilla. |
It's recommended by https://ssl-config.mozilla.org/#server=apache&version=2.4.41&config=modern&openssl=1.1.1k&guideline=5.7 to disable SSLHonorCipherOrder.