summaryrefslogtreecommitdiffstats
path: root/ssl-config-generator
diff options
context:
space:
mode:
authorGene Wood <gene_wood@cementhorizon.com>2015-04-13 16:41:00 -0700
committerGene Wood <gene_wood@cementhorizon.com>2015-04-13 16:41:00 -0700
commit6beeba225638155f3fbe2da527cdc88b6a73f3b9 (patch)
tree2d6ceb5038c288edfed0fd53ea18667325686688 /ssl-config-generator
parent9264e24be2ba0e9f567a4466a4dc0dc4c24af05c (diff)
downloadserver-side-tls-6beeba225638155f3fbe2da527cdc88b6a73f3b9.zip
server-side-tls-6beeba225638155f3fbe2da527cdc88b6a73f3b9.tar.gz
server-side-tls-6beeba225638155f3fbe2da527cdc88b6a73f3b9.tar.bz2
Remove sslv2 if the apache version is >= 2.3.16
Diffstat (limited to 'ssl-config-generator')
-rw-r--r--ssl-config-generator/index.html6
1 files changed, 5 insertions, 1 deletions
diff --git a/ssl-config-generator/index.html b/ssl-config-generator/index.html
index 136e367..1103ada 100644
--- a/ssl-config-generator/index.html
+++ b/ssl-config-generator/index.html
@@ -187,6 +187,9 @@ frontend ft_test
data.hsts = '\n # HSTS (mod_headers is required) (15768000 seconds = 6 months)' + '\n' +
' Header always add Strict-Transport-Security "max-age=15768000"';
}
+ if (isSemVer(data.serverVersion, '>=2.3.16')) {
+ data.sslProtocols = data.sslProtocols.replace(' -SSLv2','');
+ }
break;
case "haproxy":
// http://www.haproxy.org/download/1.5/doc/configuration.txt
@@ -235,10 +238,10 @@ frontend ft_test
server: $("div#server-list input:radio:checked").val(),
securityProfile: $("div#security-profile-list input:radio:checked").val()
};
+
var source = $("#" + data.server + "-template").html();
var template = Handlebars.compile(source);
data.visibility = "visible";
- jQuery.extend(data, getVersionConstrainedDirectives(data));
jQuery.extend(data, {
sslProtocols: sslProtocols[data.securityProfile][data.server],
cipherSuites: cipherSuites[data.securityProfile],
@@ -250,6 +253,7 @@ frontend ft_test
profile: $("div#security-profile-list input:radio:checked").val()
})
});
+ jQuery.extend(data, getVersionConstrainedDirectives(data));
if (isOpenSSLSemVer(data.opensslVersion, "<1.0.1") && data.securityProfile == "modern") {
$("#security-profile-list input#intermediate").prop( "checked", true );