The remote host supports the use of SSL ciphers that offer medium strength encryption
I am trying to pass a PCI compliance test and my only fail is at this level. The result I get is:
Synopsis : The remote service supports the use of medium strength SSL ciphers. Description : The remote host supports the use of SSL ciphers that offer medium strength encryption, which we currently regard as those with key lengths at least 56 bits and less than 112 bits. Solution: Reconfigure the affected application if possible to avoid use of medium strength ciphers. Risk Factor: Medium / CVSS Base Score : 5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N) [More]
I went into:
ROOT / etc / httpd / conf.d
and changed the file to read as:
SSLProtocol -all +TLSv1 +SSLv3
SSLCipherSuite HIGH:!aNULL:+SHA1:+MD5:+HIGH
When I test with this command:
# openssl s_client -connect 208.109.101.133:443 -ssl2openssl s_client -connect onlinesafetysupplies.net:443 -ssl2
It fails (that is a good thing). when I put -ssl3 (this passes).
When I put in a domain name in:
# openssl s_client -connect onlinesafetysupplies.net:443 -ssl2
this will show ssl2 is good.
I do not not know what to do next. If it matters this is on a:
godaddy dedicated server. Red Hat Fedora Core 8
There is also turbopanel.conf file but I do not think it does anything.
Also, did you create your certificate yourself? How did you create it?
//jonas
CRS6205
ASKER
I ordered the cert through GoDaddy Cert. process.
CRS6205
ASKER
I have tried several variations from the link above and nothing. My conf.d look like
# SSL Engine Switch:
# Enable/Disable SSL for this virtual host.
SSLEngine on
# SSL Protocol support:
# List the enable protocol levels with which clients will be able to
# connect. Disable SSLv2 access by default:
#SSLProtocol all -SSLv2
SSLProtocol -all +TLSv1 +SSLv3 -SSLv2
# SSL Cipher Suite:
# List the ciphers that the client is permitted to negotiate.
# See the mod_ssl documentation for a complete list.
#SSLCipherSuite ALL:!ADH:!EXPORT:!SSLv2:RC4+RSA:+HIGH:+MEDIUM:+LOW
SSLCipherSuite HIGH:!aNULL:+SHA1:+MD5:+HIGH
It just is not making sense how the server is fine and will not shake hands with SSLv2 but will with SSLv3. But the rules will not carry over to the websites.
Is there a way to do this on htaccess file?
CRS6205
ASKER
This is what I got from GoDaddy:
John S. - Server Support: It uses VirtualHosts is that is what your meaning.
John S. - Server Support: Yes, that is how the Apache configuration is actually set.
John S. - Server Support: The primary configuration file is /etc/httpd/conf.d/turbopanel.conf if you want to review how they have it setup.
Here is what is given from the turbopanel_ssl conf.
CRS6205
ASKER
Ok here is the code.
NameVirtualHost 208.109.101.160:443
DocumentRoot "/home/safetysupplies/public_html"
<Directory "/home/safetysupplies/public_html">
Options +Indexes +FollowSymLinks +Includes
XBitHack on
Order allow,deny
Allow from all
AllowOverride All
AddHandler mod_python .py
PythonHandler mod_python.publisher
PythonDebug On
</Directory>
<Location /perl-status>
SetHandler perl-script
PerlResponseHandler Apache::Status
Order deny,allow
Deny from all
Allow from onlinesafetysupplies.net
</Location>
Check out this page: http://httpd.apache.org/docs/2.0/ssl/ssl_howto.html
Also, did you create your certificate yourself? How did you create it?
//jonas