
# require OpenSSL 1.1.0, which as of this writing was in pre-release. # Many ciphers defined here require a modern version (1.0.1+) of OpenSSL. TLS requirements: # "Modern" configuration, defined by the Mozilla Foundation's SSL Configuration The following configuration enables "strong encryption", as definedĪbove, and is derived from the Mozilla Foundation's How can I create an SSL server which accepts strong encryption Requires a strong cipher for access to a particular URL? How can I create an SSL server which accepts many types of ciphers in general, but.How can I create an SSL server which accepts strong encryption only?.(As an example, HTTP compression oracle attacks such Please note that strong encryption does not, by itself, ensure Whether or not this is appropriate for your situation is a decision In other words, "strong encryption" requires that out-of-date clients beĬompletely unable to connect to the server, to prevent them from endangering

Rejection of clients that cannot meet these requirements.Support for the strongest ciphers available to modern (and up-to-date) web.Protection from known attacks on older SSL and TLS implementations, such.Private key in the present does not compromise the confidentiality of past TLS Perfect Forward Secrecy, which ensures that a compromise to a server's.Protection that most users already expect: "strong encryption" refers to a TLS implementation which provides all of theįollowing, in addition to the basic confidentiality, integrity, and authenticity The Apache HTTP Server team cannotįor the purposes of this document, which was last updated in mid-2016, Models, and your acceptable levels of risk. The definition of "strong" depends on your desired use cases, your threat "Strong encryption" is, and has always been, a moving target.
