Print

Print


Since crypto as a whole is under a lot of scrutiny with heartbleed and now
the Poodle attack, here's what we've done to mitigate things.

Disable SSL3 in IE, enable TLS 1.1/1.2

This one is easy. In the Advanced Settings tab of IE, scroll to the bottom
and uncheck SSL 2/3 if either are enabled, and make sure TLS 1.0/1.1/1.2 are
all enabled (1.1/1.2 typically are not). The IE Group Policy Object also
allows you to configure and lock this down easily. This is the MS recommend
mitigation until they patch out SSL3.

Other Browsers

I haven't found a way to disable SSL3 in Chrome, but considering their rapid
update cycle they will probably patch it out for you. In Firefox, go to
about:config and change the value on security.tls.version.min from 0 to 1.
This will bump up the minimum protocol to TLS 1.0, disabling SSL3. This
change will likely come in a patch in the next few days as well. No idea
about Safari.

Disable SSL3 in SCHANNEL, enable TLS 1.1/1.2

Unfortunately there isn't a built-in group policy object to do it, so the
attached SSL-TLS Config.reg file will do it for you. It disables SSL3 (along
with SSL2, and PCT1 if they were enabled somehow) as well as enabling TLS
1.1/1.2 if they are supported on the OS. XP/2003 only supports TLS1.0, but
it will ignore the reg keys for the protocols it doesn't have and is safe to
do across the board.

Install Server 2003 AES Hotfix

http://support.microsoft.com/kb/948963

If you still have any 2003 systems kicking around, install this hotfix to
add support for some basic AES ciphers in addition to the RC4 (bad) and 3DES
(okay) ones that it comes with. It won't apply to XP, but nobody is still
using any of those systems at this point, right? ;)

Define SCHANNEL SSL Cipher Suite Order

Policies\Admin Templates\Network\SSL Configuration Settings\SSL Cipher Suite
Order

This one needs to be done through GPO, might be possible to do through a
registry merge but I'm not sure where they keys live. Use the attached
schannel config.txt file to define which cipher suites should be used, in
order of preference. The first ones use elliptic curve key exchange which is
very good, but only supported on newer devices. The last three on the list
(TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_RSA_WITH_3DES_EDE_CBC_SHA)
are your legacy suites to support old devices. Android 2.3 , Java 6, and
Server 2003 clients with the mentioned hotfix will use the first two AES
suites, XP systems or 2003 systems without the AES hotfix will use the 3DES
suite which is still secure at this point. If you don't have any 2003/XP
systems on your network, you can probably drop 3DES.

With all that done, your HTTPS IIS websites should be validating like this:

https://www.ssllabs.com/ssltest/analyze.html?d=ipf.msu.edu&hideResults=on

Which is about as good as you can get it for now without cutting off Android
2.3 devices, which there are still a good number of floating around.