Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 
        
Home       Members    Calendar    Who's On


Add to briefcase

HTTPS: Perfect Forward Secrecy, SSLv2, cipher suites, wider SSL coverage, IIS version, etc. Expand / Collapse
Author
Message
Posted Monday, April 14, 2014 9:08 AM
SSC Eights!

SSC Eights!SSC Eights!SSC Eights!SSC Eights!SSC Eights!SSC Eights!SSC Eights!SSC Eights!

Group: General Forum Members
Last Login: Yesterday @ 7:48 AM
Points: 861, Visits: 2,359
After revamping my Firefox cipher suite list (about:config, search for tls and then search for ssl) and adding Calomel SSL Validation, HTTPS Everywhere (from eff.org), CipherFox and HTTP Nowhere, I was fairly surprised to see the following.

The list is in order of importance:

----
This web server instance is not and never was vulnerable to Heartbleed, since it runs IIS 7 (and 7.5 and 8.0 aren't vulnerable and never were either). Good result!

----
I'd suggest disabling SSLv2 entirely.

Qualys SSL Labs reports SSLv2 is available:
"This server supports SSL 2, which is obsolete and insecure. Grade set to F.
...
Protocols
TLS 1.2 No
TLS 1.1 No
TLS 1.0 Yes
SSL 3 Yes
SSL 2 INSECURE Yes"

----
Qualys SSL Labs (link above) also reports a cipher suite list that seems pretty odd:
"The server does not support Forward Secrecy with the reference browsers."

Note that in the cipher suite list does have two Forward Secrecy cipher suites, but they're in the middle; they do work properly if the clients has TLS_RSA_WITH_AES_128_CBC_SHA and TLS_RSA_WITH_AES_256_CBC_SHA disabled, though, so simply moving them to the top would be nice.

At least the TLS_RSA_WITH_RC4_128_MD5 cipher suite should be removed - MD5 is broken. I'd remove all RC4 cipher suites at this time.

----
I would suggest having HTTPS coverage extended across the entire site, instead of just the login page.
See HTTPS Mixed Content: Still the Easiest Way to Break SSL

At the same time, you could then enable HSTS (even on IIS 7.0).

----
I might also suggest upgrading IIS versions to 7.5, 8.0, or 8.5 and enabling TLS 1.2 cipher suites.
Post #1561515
Posted Tuesday, April 15, 2014 8:26 PM


SSC-Dedicated

SSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-Dedicated

Group: Administrators
Last Login: Yesterday @ 11:24 AM
Points: 33,088, Visits: 15,197
Thanks, I didn't think we were vulnerable, but hadn't checked.

Not sure we want to move the entire site to SSL, though I understand what you mean here, but perhaps moving to SSL 3 would be something I can get done.







Follow me on Twitter: @way0utwest

Forum Etiquette: How to post data/code on a forum to get the best help
Post #1562101
Posted Wednesday, April 16, 2014 8:23 AM
SSC Eights!

SSC Eights!SSC Eights!SSC Eights!SSC Eights!SSC Eights!SSC Eights!SSC Eights!SSC Eights!

Group: General Forum Members
Last Login: Yesterday @ 7:48 AM
Points: 861, Visits: 2,359
Steve Jones - SSC Editor (4/15/2014)
<snip> perhaps moving to SSL 3 would be something I can get done.


Disabling SSLv2 and moving to SSLv3 doesn't hurt anything, as XP being deprecated notwithstanding, even completely unpatched Windows XP machines with IIS 6 support SSLv3.

Even going to the next step of disabling SSLv3 isn't much of a problem, as XP being deprecated still notwithstanding, Windows XP SP3, or Windows XP SP2 with KB946627, or XP RTM with unpatched IIS 6 where users went into Options, Advanced, Security, and checked the TLS 1.0 checkbox, also have TLS 1.0 available, as does every later version and browser. I do understand wanting to keep maximum compatibility even for very old clients, though, and SSLv3 isn't nearly as broken as SSLv2 is.

Steve Jones - SSC Editor (4/15/2014)
Not sure we want to move the entire site to SSL<snip>


I did not mean moving the entire site to SSL, i.e. forcing everyone to use SSL for the entire site. What I meant was to suggest adding the capability to use SSL to the entire site, for those who desire to use it, and leaving the "force SSL on the login page" alone.
Post #1562336
« Prev Topic | Next Topic »

Add to briefcase

Permissions Expand / Collapse