当前位置:   article > 正文

服务器系列:服务器禁用TLS1.0和TLS1.1协议使网站更安全

禁用tls1.0

SSL/TLS 的版本

协议发布时间状态
SSL 1.0未公布未公布
SSL 2.01995 年已于 2011 年弃用
SSL 3.01996 年已于 2015 年弃用
TLS 1.01999 年计划于 2020 年弃用
TLS 1.12006 年计划于 2020 年弃用
TLS 1.22008 年
TLS 1.32018 年

Nginx

  1. 通常Nginx的conf/nginx.conf配置如下

ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
  1. 删除TLS1.0 TLSv1.1、增加TLS1.3

ssl_protocols TLSv1.2 TLSv1.3;
  1. 重启Nginx使配置生效

nginx -s reload

Apache

  1. 通常Apache的配置如下

SSLProtocol -ALL +TLSv1 +TLSv1.1 +TLSv1.2

1-1. 基于RedHat的发行版(CentOS,Fedora)配置文件/etc/httpd/conf/httpd.conf
1-2. 基于Debian的发行版(Ubuntu)配置文件/etc/apache2/sites-enabled/目录下

  1. 删除+TLSv1 +TLSv1.1、增加TLSv1.3

SSLProtocol -ALL +TLSv1.2 +TLSv1.3  
  1. 重启Apache使配置生效

  1. # 基于RedHat的发行版(CentOS,Fedora)
  2. systemctl restart httpd
  3. # 基于Debian的发行版(Ubuntu)
  4. service apache2 restart

IIS服务器

  1. IIS服务器需使用官方工具(IISCrypto.exe )进行修改

IISCrypto.exe

Tomcat

  1. 通常Tomcat的conf/server.xml配置如下

SSLProtocol="TLSv1+TLSv1.1+TLSv1.2"
  1. 删除+TLSv1 +TLSv1.1、增加TLS1.3

SSLProtocol="TLSv1.2+TLSv1.3"
  1. 重启Tomcat使配置生效

  1. # 关闭tomcat
  2. bin/shutdown.sh
  3. # 启动tomcat
  4. bin/startup.sh
  • 注:以上服务器增TLS1.3需要依赖openSSL的版本以及IISJava的版本的支持

检测

一、测试TLS1.0协议

openssl s_client -connect www.example.com:443 -tls1  < /dev/null

  1. CONNECTED(00000003)
  2. write:errno=104
  3. ---
  4. no peer certificate available
  5. ---
  6. No client certificate CA names sent
  7. ---
  8. SSL handshake has read 0 bytes and written 0 bytes
  9. ---
  10. New, (NONE), Cipher is (NONE)
  11. Secure Renegotiation IS NOT supported
  12. Compression: NONE
  13. Expansion: NONE
  14. No ALPN negotiated
  15. SSL-Session:
  16. Protocol : TLSv1
  17. Cipher : 0000
  18. Session-ID:
  19. Session-ID-ctx:
  20. Master-Key:
  21. Key-Arg : None
  22. Krb5 Principal: None
  23. PSK identity: None
  24. PSK identity hint: None
  25. Start Time: 1633685489
  26. Timeout : 7200 (sec)
  27. Verify return code: 0 (ok)
  28. ---
  • 注: 表示使用TLS1.0协议连接不通,说明我们已经禁用了TLS1.0
二、测试TLS1.2协议

openssl s_client -connect www.example.com:443 -tls1_2  < /dev/null

  1. CONNECTED(00000003)
  2. depth=3 O = Digital Signature Trust Co., CN = DST Root CA X3
  3. verify error:num=10:certificate has expired
  4. notAfter=Sep 30 14:01:15 2021 GMT
  5. ---
  6. Certificate chain
  7. 0 s:/CN=ztc.gzhuijiangyuan.com
  8. i:/C=US/O=Let's Encrypt/CN=R3
  9. 1 s:/C=US/O=Let's Encrypt/CN=R3
  10. i:/C=US/O=Internet Security Research Group/CN=ISRG Root X1
  11. 2 s:/C=US/O=Internet Security Research Group/CN=ISRG Root X1
  12. i:/O=Digital Signature Trust Co./CN=DST Root CA X3
  13. ---
  14. Server certificate
  15. -----BEGIN CERTIFICATE-----
  16. MIIFMzCCBBugAwIBAgISA7VcG2st4Mb9oRuhffYzViI9MA0GCSqGSIb3DQEBCwUA
  17. MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD
  18. EwJSMzAeFw0yMTA5MzAxNTE5MjhaFw0yMTEyMjkxNTE5MjdaMCExHzAdBgNVBAMT
  19. 4C7vbju3QzFzUyiu8Y3Si2V5oJbzrhIlftqQUUTU2vmMO1lmQi/uD3IqOfZZ4VXL
  20. dcOIHmUVDAzLOMa2brg8YXSQatARlhYDjC1T2aSPMxaKjKq84SHKw67PI6PGGE0u
  21. uYYizdj0riGDsULplmX/u7pFcaw6WjH9lBAasJqxGwFAeJ7AyK2N4D+WPz+fefsw
  22. IAaGUCj2G8pFoKl0N5DVzqgFIWwIxrfYYqS4ogqRUFsgZpcUuTj6
  23. -----END CERTIFICATE-----
  24. subject=/CN=www.example.com
  25. issuer=/C=US/O=Let's Encrypt/CN=R3
  26. ---
  27. No client certificate CA names sent
  28. Peer signing digest: SHA512
  29. Server Temp Key: ECDH, P-256, 256 bits
  30. ---
  31. SSL handshake has read 4702 bytes and written 415 bytes
  32. ---
  33. New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES128-GCM-SHA256
  34. Server public key is 2048 bit
  35. Secure Renegotiation IS supported
  36. Compression: NONE
  37. Expansion: NONE
  38. No ALPN negotiated
  39. SSL-Session:
  40. Protocol : TLSv1.2
  41. Cipher : ECDHE-RSA-AES128-GCM-SHA256
  42. Session-ID: C617C1E0D6945124100508852C5249DFD8D67F9312104C55547887B9CFD903
  43. Session-ID-ctx:
  44. Master-Key: 3A0F9459A936B9DC12E7F60ACF67E4B7006D950494F10AE1192E37AD4A732BA3D072EB1E0B9F317710CEAB8FAA1
  45. Key-Arg : None
  46. Krb5 Principal: None
  47. PSK identity: None
  48. PSK identity hint: None
  49. TLS session ticket lifetime hint: 300 (seconds)
  50. TLS session ticket:
  51. 0000 - ca 53 6c fd 08 46 6e c4-3f 4f 25 43 70 22 c7 95 .Sl..Fn.?O%Cp"..
  52. 0010 - cb 45 ec fd 7c 1d 49 28-58 81 e0 4d c2 bd d1 7b .E..|.I(X..M...{
  53. 0020 - 0c 23 42 0c c4 4d 58 f2-68 a7 0b a3 50 b0 ec e0 .#B..MX.h...P...
  54. 0030 - 7e 57 a1 6d 16 44 5b db-90 91 f1 2c 44 bf d9 78 ~W.m.D[....,D..x
  55. 0040 - c8 24 ea 0a e7 c6 55 b0-e2 42 6c 2c 49 7c 05 64 .$....U..Bl,I|.d
  56. 0050 - 33 91 48 9a a8 0f 97 8a-c7 06 4d ed 85 8b d2 48 3.H.......M....H
  57. 00a0 - 8a 8c 90 1c 8f 21 1b ad-37 61 00 b1 b4 fd 49 7b .....!..7a....I{
  58. Start Time: 1633686054
  59. Timeout : 7200 (sec)
  60. Verify return code: 10 (certificate has expired)
  61. ---
  62. DONE
  • 注: 表示使用TLS1.2协议连接通过,说明我们已经禁用了TLS1.2
三、第三方评测网站

一、https://myssl.com

二、https://ssllabs.com/ssltest

声明:本文内容由网友自发贡献,不代表【wpsshop博客】立场,版权归原作者所有,本站不承担相应法律责任。如您发现有侵权的内容,请联系我们。转载请注明出处:https://www.wpsshop.cn/w/木道寻08/article/detail/1020307
推荐阅读
相关标签
  

闽ICP备14008679号