Security configuration and detection of SSL after the website enables https

Security configuration and detection of SSL after the website enables https

It is standard for websites to enable SSL nowadays. However, after configuring SSL, you still need to determine whether the server deployment is secure. If it is not configured properly, it will bring many security risks.

There are six versions in the SSL/TLS family: SSL v2, SSL v3, TLS v1.0, TLS v1.1, TLS v1.2, TLS v1.3:

SSL v2 is insecure and should not be used.

SSL v3 is insecure when used with HTTP (POODLE attack) and is weak when used with other protocols. It is also outdated and should not be used.

TLS v1.0 is also a legacy protocol that should not be used, but is still often required in practice. Its main weakness (BEAST) is mitigated in modern browsers, but other issues remain.

TLS v1.1, v1.2, and v1.3 have no known security issues and should be the primary protocol for websites.

Check SSL security

At present, there are two main websites for testing SSL security: the most commonly used one is SSLLabs, and the other is MySSL made by a domestic company. If the test rating is A, it is qualified, and if it is F, it is unqualified.

SSL security configuration

For Windows Server, SSL security configuration can be completed by modifying the registry. In addition, there is a simple automatic configuration tool IISCrypto. After downloading the tool, you can complete the security settings using the recommended configuration. It is very easy to use.

3.0 Mode

Directly recommend the settings, check the reboot at the end, then apply, and it will automatically restart after setting.

123WORDPRESS.COM editor adds:

After testing, it was found that if the current machine needs to be remotely connected to another server after upgrading, the other server also needs to be upgraded.

<<:  An exploration of the JS operator in problem

>>:  MySQL knowledge points and commonly used MYSQL commands for the second-level computer exam

Recommend

Examples of optimistic locking and pessimistic locking in MySQL

The task of concurrency control in a database man...

Alibaba Cloud applies for a free SSL certificate (https) from Cloud Shield

Because the project needs to use https service, I...

Problem record of using vue+echarts chart

Preface echarts is my most commonly used charting...

Detailed analysis of when tomcat writes back the response datagram

The question arises This question arose when I wa...

CSS to achieve glowing text and a little bit of JS special effects

Implementation ideas: Use text-shadow in CSS to a...

HTML scroll bar textarea attribute setting

1. Overflow content overflow settings (set whether...

An article to deal with Mysql date and time functions

Table of contents Preface 1. Get the current time...

Explanation of building graph database neo4j in Linux environment

Neo4j (one of the Nosql) is a high-performance gr...

Mysql uses stored procedures to quickly add millions of data sample code

Preface In order to reflect the difference betwee...

How to mount a disk in Linux

When using a virtual machine, you may find that t...

Multi-service image packaging operation of Dockerfile under supervisor

Writing a Dockerfile Configure yum source cd /tmp...

Detailed example of jQuery's chain programming style

The implementation principle of chain programming...

Implementation of building custom images with Dockerfile

Table of contents Preface Introduction to Dockerf...

Steps to export the fields and related attributes of MySQL tables

Need to export the fields and properties of the t...