HTTPS website security checkup

Since making changes to this site to force a secure connection, I thought now would be a good time to do a security checkup. I used both the Symantec SSL Toolbx and Qualys SSL Labs site to see how well I did installing my certificate.
HTTPS website security checkup results
Symantec said I was in good shape against the vulnerabilities they check for, but did note that I wasn’t using a Symantec certificate (not made of money, you know)
Symantec says: Ok, but we would like your money
Symantec says: Ok, but we would like your money
I had run the sslLabs test earlier in the week and had to correct for Poodle by adding the following to /etc/httpd/conf.d/ssl.conf
SSLProtocol All -SSLv2 -SSLv3
I had originally set the value in the virtual host config files, but sslLabs still pegged the grade as a “C”. Making the change in /etc/httpd/conf.d/ssl.conf and refreshing the results brought my grade up to a “B”.
better than a "C", but a "B" leaves room for improvement
Still some work to be done
In the same /etc/httpd/conf.d/ssl.conf file I also updated the ciphers — and learned that you have to add this value to your vhost siteName.conf file also!
SSLCipherSuite EECDH+AESGCM:EDH+AESGCM:AES256+EECDH:AES256+EDH:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA:DES-CBC3-SHA:HIGH:!aNULL:!eNULL:!EXPORT:!DES:!MD5:!PSK:!RC4
and turned off SSL compression for CRIME attack mitigation
SSLCompression off
…and I finally got an A…well, A-
A- after all that work?
At least it’s an A
sslReport-20150718 to review later….
Refer: https://code.circayou.com/https-website-security-checkup/

Nhận xét

Bài đăng phổ biến từ blog này

CLEANING UP THE ZABBIX DATABASE

Configuring DHCP Relay service on the FortiGate unit

[Resolved] Amazon EC2 Redhat 7 using 6GB for the root space