Security configuration and detection of SSL after the website enables https

Security configuration and detection of SSL after the website enables https

It is standard for websites to enable SSL nowadays. However, after configuring SSL, you still need to determine whether the server deployment is secure. If it is not configured properly, it will bring many security risks.

There are six versions in the SSL/TLS family: SSL v2, SSL v3, TLS v1.0, TLS v1.1, TLS v1.2, TLS v1.3:

SSL v2 is insecure and should not be used.

SSL v3 is insecure when used with HTTP (POODLE attack) and is weak when used with other protocols. It is also outdated and should not be used.

TLS v1.0 is also a legacy protocol that should not be used, but is still often required in practice. Its main weakness (BEAST) is mitigated in modern browsers, but other issues remain.

TLS v1.1, v1.2, and v1.3 have no known security issues and should be the primary protocol for websites.

Check SSL security

At present, there are two main websites for testing SSL security: the most commonly used one is SSLLabs, and the other is MySSL made by a domestic company. If the test rating is A, it is qualified, and if it is F, it is unqualified.

SSL security configuration

For Windows Server, SSL security configuration can be completed by modifying the registry. In addition, there is a simple automatic configuration tool IISCrypto. After downloading the tool, you can complete the security settings using the recommended configuration. It is very easy to use.

3.0 Mode

Directly recommend the settings, check the reboot at the end, then apply, and it will automatically restart after setting.

123WORDPRESS.COM editor adds:

After testing, it was found that if the current machine needs to be remotely connected to another server after upgrading, the other server also needs to be upgraded.

<<:  An exploration of the JS operator in problem

>>:  MySQL knowledge points and commonly used MYSQL commands for the second-level computer exam

Recommend

Summary of common sql statements in Mysql

1. mysql export file: SELECT `pe2e_user_to_compan...

How to Fix File System Errors in Linux Using ‘fsck’

Preface The file system is responsible for organi...

Nginx domain name SSL certificate configuration (website http upgraded to https)

Preface HTTP and HTTPS In our daily life, common ...

Let's talk in detail about how the NodeJS process exits

Table of contents Preface Active withdrawal Excep...

Troubleshooting ideas and solutions for high CPU usage in Linux systems

Preface As Linux operation and maintenance engine...

Solve the 1251 error when establishing a connection between mysql and navicat

I reinstalled the computer and installed the late...

How to deploy ElasticSearch in Docker

1. What is ElasticSearch? Elasticsearch is also d...

Mysql8.0 uses window functions to solve sorting problems

Introduction to MySQL Window Functions MySQL has ...

Detailed explanation of how two Node.js processes communicate

Table of contents Preface Communication between t...

MySQL table type storage engine selection

Table of contents 1. View the storage engine of t...

Common Linux English Error Chinese Translation (Newbies Must Know)

1.command not found command not found 2. No such ...

Ubuntu installation cuda10.1 driver implementation steps

1. Download cuda10.1: NVIDIA official website lin...

Introduction to RHCE bridging, password-free login and port number modification

Table of contents 1. Configure bridging and captu...

Modularity in Node.js, npm package manager explained

Table of contents The basic concept of modularity...