7.4 Ensure Weak SSL Protocols Are Disabled - 'TLSv1'

Information

The Apache 'SSLProtocol' directive specifies the SSL and TLS protocols allowed. Both the SSLv2 and the SSLv3 protocols should be disabled in this directive because they are outdated and vulnerable to information disclosure. Only TLS protocols should be enabled.

Rationale:

The SSLv2 and SSLv3 protocols are flawed and shouldn't be used, as they are subject to man-in-the-middle attacks and other cryptographic attacks. The TLSv1 protocols should be used instead, and the newer TLS protocols are preferred.

Solution

Perform the following to implement the recommended state:

Search the Apache configuration files for the SSLProtocol directive. Add the directive if not present or change the value to match one of the following values. The first setting, 'TLSv1.1 TLS1.2', is preferred when it is acceptable to also disable the TLSv1.0 protocol. See the level 2 recommendation 'Ensure the TLS v1.0 Protocol Is Disabled' for details.

SSLProtocol TLSv1.1 TLSv1.2

SSLProtocol TLSv1

See Also

https://workbench.cisecurity.org/files/2020

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-13, CSCv6|14.2

Plugin: Unix

Control ID: 1e5cc1457ee250b0160ad9340078ffd05c57a2881af0aedbbfd77e57ba71e6a4