I am trying to pass a PCI compliance test and my only fail is at this level. The result I get is:
Synopsis : The remote service supports the use of medium strength SSL ciphers. Description : The remote host supports the use of SSL ciphers that offer medium strength encryption, which we currently regard as those with key lengths at least 56 bits and less than 112 bits. Solution: Reconfigure the affected application if possible to avoid use of medium strength ciphers. Risk Factor: Medium / CVSS Base Score : 5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N) [More]
I went into:
ROOT / etc / httpd / conf.d
and changed the file to read as:
SSLProtocol -all +TLSv1 +SSLv3
When I test with this command:
# openssl s_client -connect 22.214.171.124:443 -ssl2openssl s_client -connect onlinesafetysupplies.net:443 -ssl2
It fails (that is a good thing). when I put -ssl3 (this passes).
When I put in a domain name in:
# openssl s_client -connect onlinesafetysupplies.net:443 -ssl2
this will show ssl2 is good.
I do not not know what to do next. If it matters this is on a:
godaddy dedicated server. Red Hat Fedora Core 8
There is also turbopanel.conf file but I do not think it does anything.