Add ECDHE ciphers and set to true, should enable pfs#150
Add ECDHE ciphers and set to true, should enable pfs#150jdotpz wants to merge 2 commits intomozilla:masterfrom
Conversation
|
@jvehent JP of MoFo has identified some new ciphers. Want to weigh in on this? |
|
The ciphers are good. How does the script deal with the ciphersuite ordering? The default ELB policy has strong ordering to prefer some ciphers, and we want that as well, but I don't see how it's applied in the script. |
|
I just added in a bit to include that setting, and elb's I use it against are coming back with an A rating. |
|
Beautiful! r+ |
|
@jdotpz : Do you have a public endpoint I can take a look at? |
|
webmaker.org |
|
/me likes ! $ ./cipherscan popcorn.webmaker.org
......................
prio ciphersuite protocols pfs_keysize
1 ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 ECDH,P-256,256bits
2 ECDHE-RSA-AES128-SHA256 TLSv1.2 ECDH,P-256,256bits
3 ECDHE-RSA-AES128-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2 ECDH,P-256,256bits
4 ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 ECDH,P-256,256bits
5 ECDHE-RSA-AES256-SHA384 TLSv1.2 ECDH,P-256,256bits
6 ECDHE-RSA-AES256-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2 ECDH,P-256,256bits
7 AES128-GCM-SHA256 TLSv1.2
8 AES128-SHA256 TLSv1.2
9 AES128-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2
10 AES256-GCM-SHA384 TLSv1.2
11 AES256-SHA256 TLSv1.2
12 AES256-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2
13 DHE-RSA-AES128-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2 DH,1024bits
14 CAMELLIA128-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2
15 RC4-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2
16 DHE-RSA-AES256-GCM-SHA384 TLSv1.2 DH,1024bits
17 DHE-RSA-AES256-SHA256 TLSv1.2 DH,1024bits
18 DHE-RSA-AES256-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2 DH,1024bits
19 CAMELLIA256-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2
20 DHE-RSA-AES128-GCM-SHA256 TLSv1.2 DH,1024bits
21 DHE-RSA-AES128-SHA256 TLSv1.2 DH,1024bits
Certificate: trusted, 2048 bit, sha1WithRSAEncryption signature |
|
Note to self: replace RC4 with 3DES. |
|
As some context, everything other than Persona is currently using the AWS defined |
|
AWS default policy is decent. But in the future, I'd like to have 2 configurations: one that has SSL3 for backward compatible sites, and one that doesn't. We could disable SSL3 and TLS1, as well as RC4 and 3DES entirely. Maybe even enable PFS only ciphersuite. |
http://aws.amazon.com/blogs/aws/elastic-load-balancing-perfect-forward-secrecy-and-other-security-enhancements