7.4 Ensure Weak SSL Protocols Are Disabled - 'TLSv1'

Information

The Apache 'SSLProtocol' directive specifies the SSL and TLS protocols allowed. Both the SSLv2 and the SSLv3 protocols should be disabled in this directive because they are outdated and vulnerable to information disclosure. Only TLS protocols should be enabled.

Rationale:

The SSLv3 protocol was discovered to be vulnerable to the POODLE attack (Padding Oracle On Downgraded Legacy Encryption) in October 2014. The attack allows decryption and extraction of information from the server's memory. Due to this vulnerability disabling the SSLv3 protocol is highly recommended.

Solution

Perform the following to implement the recommended state: Search the Apache configuration files for the 'SSLProtocol' directive; add the directive, if not present, or change the value to match one of the following values. The first setting 'TLS1.2' is preferred when it is acceptable to also disable the TLSv1.0 and TLSv1.1 protocols. See the level 2 recommendation 'Ensure the TLSv1.0 and TLSv1.1 Protocols are Disabled' for details.

SSLProtocol TLS1.2

SSLProtocol TLSv1

See Also

https://workbench.cisecurity.org/files/2381