summaryrefslogtreecommitdiff
path: root/docs/conf
diff options
context:
space:
mode:
authorKaspar Brand <kbrand@apache.org>2011-11-18 17:17:20 +0000
committerKaspar Brand <kbrand@apache.org>2011-11-18 17:17:20 +0000
commit96746b9253f64ebc4df91522eb59d5cc111dae84 (patch)
tree0b2ec8e7ecc62277e0b7f5f955f3676d7c5b4a0b /docs/conf
parent78b9f5093f261f6b907cfeeb603c1c7a6f49c027 (diff)
downloadhttpd-96746b9253f64ebc4df91522eb59d5cc111dae84.tar.gz
Change the SSLCipherSuite default to a shorter, whitelist
oriented definition, and add an example for a speed-optimized configuration (commented out by default). In the SSL How-To, streamline the SSLCipherSuite examples where applicable (explicitly banning EXP and NULL is not needed when only HIGH is specified). git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1203752 13f79535-47bb-0310-9956-ffa450edef68
Diffstat (limited to 'docs/conf')
-rw-r--r--docs/conf/extra/httpd-ssl.conf.in19
1 files changed, 13 insertions, 6 deletions
diff --git a/docs/conf/extra/httpd-ssl.conf.in b/docs/conf/extra/httpd-ssl.conf.in
index 144dfe7cc1..1e822a31a1 100644
--- a/docs/conf/extra/httpd-ssl.conf.in
+++ b/docs/conf/extra/httpd-ssl.conf.in
@@ -48,12 +48,19 @@ Listen @@SSLPort@@
# SSL Cipher Suite:
# List the ciphers that the client is permitted to negotiate.
# See the mod_ssl documentation for a complete list.
-SSLCipherSuite RC4-SHA:AES128-SHA:ALL:!aNULL:!EXP:!LOW:!MD5:!SSLV2:!NULL
-
-# SSL Cipher Honor Order:
-# On a busy HTTPS server you may want to enable this directive
-# to force clients to use one of the faster ciphers like RC4-SHA
-# or AES128-SHA in the order defined by SSLCipherSuite.
+SSLCipherSuite HIGH:MEDIUM:!aNULL:!MD5
+
+# Speed-optimized SSL Cipher configuration:
+# If speed is your main concern (on busy HTTPS servers e.g.),
+# you might want to force clients to specific, performance
+# optimized ciphers. In this case, prepend those ciphers
+# to the SSLCipherSuite list, and enable SSLHonorCipherOrder.
+# Caveat: by giving precedence to RC4-SHA and AES128-SHA
+# (as in the example below), most connections will no longer
+# have perfect forward secrecy - if the server's key is
+# compromised, captures of past or future traffic must be
+# considered compromised, too.
+#SSLCipherSuite RC4-SHA:AES128-SHA:HIGH:MEDIUM:!aNULL:!MD5
#SSLHonorCipherOrder on
# Pass Phrase Dialog: