A PCI Compliance scan has suggested that we disable Apache's MEDIUM and LOW/WEAK strength ciphers for security. Can someone tell me how to disable these ciphers?
Apache v2.2.14 mod_ssl v2.2.14
This is what they've told us:
Synopsis : The remote service supports the use of medium strength SSL ciphers. Description : The remote host supports the use of SSL ciphers that offer medium strength encryption, which we currently regard as those with key lengths at least 56 bits and less than 112 bits. Solution: Reconfigure the affected application if possible to avoid use of medium strength ciphers. Risk Factor: Medium / CVSS Base Score : 5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N) [More]
Synopsis : The remote service supports the use of weak SSL ciphers. Description : The remote host supports the use of SSL ciphers that offer either weak encryption or no encryption at all. See also : http://www.openssl.org/docs/apps/ciphers .html Solution: Reconfigure the affected application if possible to avoid use of weak ciphers. Risk Factor: Medium / CVSS Base Score : 5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N) [More]
Depending on your needs, you can come up with an SSLCipherSuite line that handles the job for you.
http://httpd.apache.org/docs/2.2/mod/mod_ssl.html#sslciphersuite
Mine are below and they pass PCI scans.
If you are unsure what ciphers this
SSLCipherSuite
line ends up permitting, you can run it through openssl:This will give you a list of cipher combinations:
Modify the argument until you end up with a list that contains only the ciphers you are allowed to offer.
Note that !MEDIUM will disable 128 bit ciphers as well, which is more than you need for your original request. The following config passed my PCI compliance scan, and is bit more friendly towards older browsers:
SSL Version 3 is insecure due to Poodle Attack (refer:http://disablessl3.com/)
Just giving another solution. Per the suggestions from ssltools.com here was their suggestion that worked for me:
Is what I am using - which, according to ssllabs.com gives the highest level of security.
better use cipher generator by mozilla, I follow this https://mozilla.github.io/server-side-tls/ssl-config-generator
The mod_ssl documentation lists MEDIUM as "all ciphers with 128 bit encryption", while HIGH is described as "all ciphers using Triple-DES". I'm guessing that this is a documentation error, but if not "MEDIUM" is actually higher than "HIGH".
As you were told that you need at least 112 bit keys; this shouldn't matter for you as both HIGH and MEDIUM will be strong enough and you should include both.
This is what I ended up having to use: