Let's begin at the beginning:
Why do you need to use DH at all?
[it is a very difficult to implement protocol - there is no negotiation on DH size]
[and it is not really that secure]
I still get: SSLOpenSSLConfCmd: command not found
What would you suggest? As a good secure solution? I want it to make my site secure, that's it, really.
And where do I type this?
Then don't use any DH ciphers.
Use TLS1.2 and higher.
Check the site with SSL Labs.
That goes into the Apache
configuration file - within the HTTPS server block.
NOT something you type at the CLI.
It works! Is there a better option?
I just realized i need ffdhe4096 (RFC 7919)
How to do so?
Thanks
Why?
[you can't be serious!]
Due to this test:
It is a test site made by the danish government*
I reiterate:
Why do you need DH at all?
To pass the test
Why do you care about passing the test? That page reflects one person or organization's opinion of how a website should be. Why do you care about that organization's opinion?
I like to do it and get a better and safer site - and do it as a hobby and as a way to learn about it.
...and why do you trust that test? Again, that test constitutes the opinion of that organization. If you use a different test, it will give you a different result. But surely you can Google how to change the DH group if you feel like you need to do that.
Then you have two choices:
- remove the DHE ciphers [and PASS the test]
- use 4096 DH, with:
openssl dhparam -out dhparams.pem20484096
ensure server cipher order preference leaves the DHE ciphers for last
[again: They are hard to implement; As there is no size negotiation]
Why would you do this? Just change 2048
to 4096
in the ffdhe...txt
URL from Mozilla I've posted earlier.....
Because, despite w/e Mozilla might have said, you aren't supposed to reuse such things - bad practice!