We want to reject TLS 1.0 connections. I can’t find a place where this is set for HTTPD24/nginx. Where can we set the SSLProtocol?
If you are running OnDemand 1.5, check
There’s a section in that file
SSL Protocol support:
List the enable protocol levels with which clients will be able to
connect. Disable SSLv2 access by default:
SSLProtocol all -SSLv2
I think you could add a “-TLSv1”, etc. to that list. See
under SSLProtocol Directive for more info.
I think the file location is the same in older versions, but I don’t remember for sure,
@gwylym, that seems to be the correct answer. Did it work for you? If so, can you mark his answer as the solution.
If I may ask, is it just a security concern for you to disable v1, are there serious vulnerabilities we should be on the lookout for?
Yes, it is a security concern. There are a number of different TLS and ciphers that are no longer considered secure and best practice in the industry indicates to disable them.
For Apache we do the following which includes setting a medium cipher suite:
SSLProtocol -ALL +TLSv1.1 +TLSv1.2
Rather than editing an RPM controlled file (…/conf.d/ssl.conf), I wound up adding
although any file name the collates after ssl.conf should work. My add-on file contains:
# This is not in ssl.conf, we don't have to alter RPM owned file # (e.g., ../conf/httpd.conf or ./ssl.conf). # TraceEnable Off FileETag None SSLCipherSuite ALL:!ADH:!EXP:!LOW:!RC2:!3DES:!SEED:!RC4:+HIGH:+MEDIUM SSLProtocol All -SSLv2 -SSLv3 -TLSv1 -TLSv1.1 SSLHonorCipherOrder On # #-end of sslnessus.conf