Depends, for some reason I canāt get the apache plugin of the client āseeā my ServerAlias, but you could try to specify both hostnames on the command line with -d sslpower.ml -d www.sslpower.ml, so the client will actually use both.
Furthermore, youāre referring to cert.pem as wel as fullchain.pem in your Apache configuration. This results in the Chain issues Incorrect order, Extra certs error on SSLLabs. Depending on your Apache version, youāll have to choose:
Apache version 2.4.8 or higher: only use SSLCertificateFile, pointing to fullchain.pem (that file includes the chain Ɣnd your cert)
Apache version lower than 2.4.8: point SSLCertificateFile to cert.pem and SSLCertificateChainFile to chain.pem (and notfullchain, because then youāll sending your own certificate twiceā¦)
However, 100% on the Key Exchange is quite possible without breaking stuff, but Iād want to mention the issue with the whole āI must have 100%!!!11ā thingyā¦
For 100% Key Exchange, add the following somewhere in your Apache configuration:
Iām still not entirely sure the first one is needed, but with these two items, my Apache accepts all three ECC curves, so SSLLabs will grant you 100%.
I had version: Apache/2.4.7 (Ubuntu) but i updated to version: Apache/2.4.20 (Ubuntu) and then i restarted apache
and it says * The apache2 configtest failed.
Output of config test was:
AH00526: Syntax error on line 11 of /etc/apache2/sites-enabled/default-ssl.conf:
SSLCertificateFile takes one argument, SSL Server Certificate file (ā/path/to/fileā - PEM or DER encoded)
Action āconfigtestā failed.
Perhaps the Apache error message handling thingy messes up the line counting, you should look at the SSLCertificateFile. And obvious you didnāt read my previous post entirely, because youāre still pointing the SSLCertificateChainFile directive to fullchain.pem
i fixed problem on line 11 i had 2 spaces thereā¦
now it works
But bro, i think i dont understand you
I have this in config
SSLCertificateFile /etc/letsencrypt/live/sslpower.ml-0002/cert.pem
SSLCertificateKeyFile /etc/letsencrypt/live/sslpower.ml-0002/privkey.pem
SSLCertificateChainFile /etc/letsencrypt/live/sslpower.ml-0002/fullchain.pem
Can you write me what i have to change?
Congratulations, you've got a 4x100% score. Now your site isn't accessible by a lot of (mainly) old clients and using a old-fasioned, proven weak mode of operation in modern ciphers
Not everyone is sharing the same opinion. Some people even say 256 bits AES is less secure than 128 bits AES (many interesting links in that topic). I don't agree with that specific statement by the way.
But all agree the GCM mode of operation is way better than the CBC mode of operation. Unfortunately, removing CBC altogether from your cipher list will result in many, MANY clients refusing a connection to your server, because most modern browsers will only accept 128 bits GCM because of "performance reasons". If you look at your current configuration, still about 50% of clients is using the CBC mode of operation..
So it depends in what you believe is safer.. After reading a lot about it ofcourse