- Specifies a list of
SSL> ciphers that are allowed to be
+ Specifies a list of
SSL> cipher suites that are allowed to be
used on secure connections. See
the ciphers> manual page
in the
OpenSSL> package for the syntax of this setting
- and a list of supported values. The default value is usually
- reasonable, unless you have specific security requirements.
+ and a list of supported values. The default value is
+ HIGH:MEDIUM:+3DES:!aNULL>. It is usually reasonable,
+ unless you have specific security requirements.
+
+
+ Explanation of the default value:
+
+
+ HIGH
+
+ Cipher suites that use ciphers from HIGH> group (e.g.,
+ AES, Camellia, 3DES)
+
+
+
+
+
+ MEDIUM
+
+ Cipher suites that use ciphers from MEDIUM> group
+ (e.g., RC4, SEED)
+
+
+
+
+
+ +3DES
+
+ The OpenSSL default order for HIGH> is problematic
+ because it orders 3DES higher than AES128. This is wrong because
+ 3DES offers less security than AES128, and it is also much
+ slower. +3DES> reorders it after all other
+ HIGH> and MEDIUM> ciphers.
+
+
+
+
+
+ !aNULL
+
+ Disables anonymous cipher suites that do no authentication. Such
+ cipher suites are vulnerable to man-in-the-middle attacks and
+ therefore should not be used.
+
+
+
+
+
+
+ Available cipher suite details will vary across OpenSSL versions. Use
+ the command
+ openssl ciphers -v 'HIGH:MEDIUM:+3DES:!aNULL' to
+ see actual details for the currently installed
OpenSSL>
+ version. Note that this list is filtered at run time based on the
+ server key type.
#authentication_timeout = 1min # 1s-600s
#ssl = off # (change requires restart)
-#ssl_ciphers = 'DEFAULT:!LOW:!EXP:!MD5:@STRENGTH' # allowed SSL ciphers
+#ssl_ciphers = 'HIGH:MEDIUM:+3DES:!aNULL' # allowed SSL ciphers
# (change requires restart)
#ssl_prefer_server_ciphers = on # (change requires restart)
#ssl_ecdh_curve = 'prime256v1' # (change requires restart)