Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Replaceing old TLS versions and insecure ciphers #414

Closed

Conversation

ksaadDE
Copy link
Contributor

@ksaadDE ksaadDE commented May 17, 2022

Description of the issue/feature this PR addresses:
NEVER use SSL / TLS in outdated versions or insecure / oudated ciphers. Current state-of-the-art TLS Versions are TLSv1.2 and TLSv1.3. TLSv1.2 is only enabled for backwards compatibility. Ciphers are taken out of the guide.

ssl_ciphers ECDHE-RSA-AES256-GCM-SHA512:DHE-RSA-AES256-GCM-SHA512:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA384;

Are the recommended ciphers out of source 4 in combination of all other sources.

source 1: https://www.linuxtechi.com/harden-secure-nginx-web-server-linux
source 2: https://beaglesecurity.com/blog/article/nginx-server-security.html
source 3: https://www.acunetix.com/blog/articles/tls-ssl-cipher-hardening/
source 4: https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html

Current behavior before PR:
Using outdated TLS versions and SSL ciphers.

Desired behavior after PR is merged:
solved that issue, could be a bit slower and drops support for old systems. However, most systems using TLSv1.2 and TLSv1.3. If downgrading is needed the git commit history shows the old file, which can be taken.

NEVER use SSL / TLS in outdated versions or insecure / oudated ciphers. Current state-of-the-art TLS Versions are TLSv1.2 and TLSv1.3. TLSv1.2 is only enabled for backwards compatibility. Ciphers are taken out of the guide. 

```ssl_ciphers ECDHE-RSA-AES256-GCM-SHA512:DHE-RSA-AES256-GCM-SHA512:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA384;```

Are the recommended ciphers out of  source 4 in combination of all other sources.
 
source 1: https://www.linuxtechi.com/harden-secure-nginx-web-server-linux
source 2: https://beaglesecurity.com/blog/article/nginx-server-security.html
source 3: https://www.acunetix.com/blog/articles/tls-ssl-cipher-hardening/
source 4: https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html
@ksaadDE ksaadDE closed this May 17, 2022
@ksaadDE ksaadDE deleted the ksaadDE-PatchTLSVAndCiphers-1 branch May 17, 2022 23:26
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant