On Wed, Feb 17, 2016 at 07:43:32AM +0100, mlrx wrote: > >> # Apache 2.4 > >> SSLCipherSuite HIGH:kEECDH:+ECDSA:ECDSA:kEECDH:kEDH:+SHA:STRENGTH: \ > >> !aNULL:!eNULL:!LOW:!MEDIUM:!3DES:!MD5:!EXP:!RC4:!DSS: \ > >> !PSK:!SRP:!kECDH:!CAMELLIA:!IDEA:!SEED This setting is a horrible mess, whichever site recommended this, never listen to anything they recommend again. I sure hope Apache provides a more sensible default, but if you must, try one of: * !COMPLEMENTOFDEFAULT:AESGCM+aRSA+kEECDH:AESGCM+aRSA+kEDH:@STRENGTH * !COMPLEMENTOFDEFAULT:AES+aRSA+kEECDH:AES+aRSA+kEDH:@STRENGTH * !COMPLEMENTOFDEFAULT:AES+aRSA+kEECDH:AES+aRSA+kEDH:AES+aRSA+kRSA:@STRENGTH The first one gives you the RFC7525 ciphers, the second allows non-AEAD ciphers, and the third also non-PFS ciphers. Which is best for you depends on what clients you need to interoperate with. You'll want a 2048-bit RSA key, secp384r1 or secp256r1 for an EECDH curve, and DH parameters based on a 2048-bit EDH safe prime. This answers one possible question about your configuration. -- Viktor.