logo
Apache Lounge
Webmasters

 

About Forum Index Downloads Search Register Log in RSS X


Keep Server Online

If you find the Apache Lounge, the downloads and overall help useful, please express your satisfaction with a donation.

or

Bitcoin

A donation makes a contribution towards the costs, the time and effort that's going in this site and building.

Thank You! Steffen

Your donations will help to keep this site alive and well, and continuing building binaries. Apache Lounge is not sponsored.
Post new topic   Forum Index -> Apache View previous topic :: View next topic
Reply to topic   Topic: TR-03116-4 - Strict TLS Configuration
Author
Constey



Joined: 11 Feb 2025
Posts: 2
Location: DE

PostPosted: Tue 11 Feb '25 16:12    Post subject: TR-03116-4 - Strict TLS Configuration Reply with quote

Hi there,
i've the requirement to configure apache2 for TR-03116-4 (https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03116/BSI-TR-03116-4.pdf?__blob=publicationFile&v=5)

I've almost got the correct configuration, but there is one part still incorrect and I don't get it.

I've testing my site with tls-check.de and get almost all green: https://i.sstatic.net/TpiPZRZJ.png
I'm just missing the "TLS 1.2 Supported Signature Algorithms". Anyone here who knows what I am missing?

Thanks in advance,
Constantin

Code:
 SSL Stapling
# Specify the OCSP cache response location and size
SSLStaplingCache "shmcb:logs/stapling-cache(150000)"

<VirtualHost *:443>
    ServerName domain.de
    ServerAdmin domain@domain.de
    DocumentRoot /var/www/html/domain

    SSLEngine on

    SSLCertificateFile /etc/apache2/ssl/cert.crt
    SSLCertificateKeyFile /etc/apache2/ssl/cert.key

    # =========================================================================
    # TLS Protocols
    # Only allow TLSv1.2 and TLSv1.3 (disabling older protocols)
    # BSI-TR-03116-4 recommends using at least TLS 1.2 with secure cipher suites.
    # =========================================================================
    SSLProtocol -all +TLSv1.2 +TLSv1.3

    # =========================================================================
    # Cipher Suites
    # SSLHonorCipherOrder On ensures the server enforces the order below.
    # Adjust the following as new ciphers are recommended/approved.
    # =========================================================================
    SSLHonorCipherOrder On
    # Example for TLS 1.3:
    SSLCipherSuite TLSv1.3 TLS_AES_256_GCM_SHA384:TLS_AES_128_GCM_SHA256
    # Für TLS 1.2:
    SSLCipherSuite ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256

    # Disable compression to prevent CRIME attacks
    SSLCompression Off

    # Disable session tickets if recommended (optional, depends on your setup)
    SSLSessionTickets On

    # Named Groups (TLS 1.3?)
    SSLOpenSSLConfCmd Curves X25519:secp521r1:secp384r1:prime256v1


    # OCSP Stapling improves performance by providing the clients with up-to-date status of your certificate.
    SSLUseStapling on

    Header always set Strict-Transport-Security "max-age=15768000"
    Header always set X-Content-Type-Options "nosniff"

    Header set Content-Security-Policy "default-src 'self' data: 'unsafe-inline' 'unsafe-hashes' 'unsafe-eval' *.domain.de; frame-ancestors 'self' *.domain.de; base-uri 'self' *.domain.de; script-src 'self' data: 'unsafe-inl>
    Header set Referrer-Policy "no-referrer"
    Header set X-Content-Type-Options "nosniff"
    Header set X-XSS-Protection "1; mode=block"
    # Ende
Back to top
James Blond
Moderator


Joined: 19 Jan 2006
Posts: 7389
Location: Germany, Next to Hamburg

PostPosted: Wed 12 Feb '25 15:25    Post subject: Reply with quote

Moin!
What is missing is a tricky parameter.

Code:

SSLOpenSSLConfCmd SignatureAlgorithms "ECDSA+SHA512:ECDSA+SHA384:ECDSA+SHA256:RSA+SHA512:RSA+SHA384:RSA+SHA256:rsa_pss_rsae_sha512:rsa_pss_rsae_sha384:rsa_pss_rsae_sha256"
Back to top
Constey



Joined: 11 Feb 2025
Posts: 2
Location: DE

PostPosted: Wed 12 Feb '25 17:17    Post subject: Reply with quote

thanks very much, that makes the point. you are my hero of today Smile
Back to top
James Blond
Moderator


Joined: 19 Jan 2006
Posts: 7389
Location: Germany, Next to Hamburg

PostPosted: Thu 13 Feb '25 12:12    Post subject: Reply with quote

Hello,
I found the test that you are using. In the detailed tab there is still an "issue" with point 2.3.3 that not all required ciphers are supported.

did you solve that?
Back to top
James Blond
Moderator


Joined: 19 Jan 2006
Posts: 7389
Location: Germany, Next to Hamburg

PostPosted: Tue 18 Feb '25 13:24    Post subject: Reply with quote

I figured out you are missing Curves and ciphers. This is how to solve that.

Code:

# The must-have ECDHE-ECDSA-AES128-SHA256 aka TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 required by the BSI is a weak cipher
SSLCipherSuite ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-SHA256
SSLCipherSuite TLSv1.3 TLS_AES_256_GCM_SHA384

SSLOpenSSLConfCmd Curves X25519:secp521r1:secp384r1:brainpoolP256r1
Back to top


Reply to topic   Topic: TR-03116-4 - Strict TLS Configuration View previous topic :: View next topic
Post new topic   Forum Index -> Apache