7.4 Ensure Weak SSL Protocols Are Disabled - 'TLSv1'

Information

The Apache 'SSLProtocol' directive specifies the SSL and TLS protocols allowed. Both the SSLv2 and the SSLv3 protocols should be disabled in this directive because they are outdated and vulnerable to information disclosure. Only TLS protocols should be enabled.

Rationale:

The SSLv2 and SSLv3 protocols are flawed and shouldn't be used, as they are subject to man-in-the-middle attacks and other cryptographic attacks. The TLSv1 protocols should be used instead, and the newer TLS protocols are preferred.

Solution

Perform the following to implement the recommended state:

Search the Apache configuration files for the SSLProtocol directive. Add the directive if not present or change the value to match one of the following values. The first setting 'TLS1.2' is preferred when it is acceptable to also disable the TLSv1.0 and TLSv1.1 protocols. See the level 2 recommendation 'Ensure the TLSv1.0 and TLSv1.1 Protocols are Disabled' for details.

SSLProtocol TLS1.2

SSLProtocol TLSv1

See Also

https://workbench.cisecurity.org/files/2378

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-8, CSCv6|14.2, CSCv7|14.4

Plugin: Unix

Control ID: 41d7bea19d459c74cb7d597d008141d596bb8c38d6e3a5ad49577846170e379c