This is a only version

Found at: raymii.org:70/Strong_SSL_Security_On_lighttpd.txt

This is a text-only version of the following page on https://raymii.org:
Title       : 	Strong SSL Security on lighttpd
Author      : 	Remy van Elst
Date        : 	14-06-2015
Last update : 	27-04-2019
URL         : 	https://raymii.org/s/tutorials/Strong_SSL_Security_On_lighttpd.html
Format      : 	Markdown/HTML
[![A on ssl labs test][1]][2]
This tutorial shows you how to set up strong SSL security on the lighttpd
webserver. We do this by updating OpenSSL to the latest version to mitigate
attacks like Heartbleed, disabling SSL Compression and EXPORT ciphers to
mitigate attacks like FREAK, CRIME and LogJAM, disabling SSLv3 and below because
of vulnerabilities in the protocol and we will set up a strong ciphersuite that
enables Forward Secrecy when possible. We also enable HSTS and HPKP. This way we
have a strong and future proof ssl configuration and we get an A+ on the Qually
Labs SSL Test.
I've written an Open Source [SSL server test][3]. You can use it to test your
configuration, as an addition to the other SSL tests our there. It is fast,
shows you all the information so you can make your own informed decision (no
ratings), and the results are saved so you can compare different settings. You
can test your site via .
I've also written a handy tool which notifies you when your certificates are
about to expire. It is open source so you can host it yourself internally and
there is a hosted version available at .
I've created a website with [Copy-pastable strong cipherssuites for NGINX,
Apache, Lighttpd and other software: https://cipherli.st][4]. Handy if you don't
want to read this entire tutorial. This tutorial and [https://cipherli.st][4]
are updated continuously as new vulnerabilities are discovered.

I'm developing an open source monitoring app called Leaf Node Monitoring, for windows, linux & android. Go check it out!

Consider sponsoring me on Github. It means the world to me if you show your appreciation and you'll help pay the server costs.

You can also sponsor me by getting a Digital Ocean VPS. With this referral link you'll get $100 credit for 60 days.

  * [This tutorial is also available for Apache2][6]
  * [This tutorial is also available for NGINX][7]
  * [This tutorial is also available for FreeBSD, NetBSD and OpenBSD over at the BSD Now podcast][8]
You can find more info on the topics by following the links below:
  * [BEAST Attack][9]
  * [CRIME Attack][10]
  * [Heartbleed][11]
  * [FREAK Attack][12]
  * [Perfect Forward Secrecy][13]
  * [Dealing with RC4 and BEAST][14]
_Make sure you backup the files before editing them!_
### SSL Protocols
All protocols other than TLS 1.2 and TLS 1.3 are considered unsafe.
Edit the config file:
    ssl.use-sslv2 = "disable"
    ssl.use-sslv3 = "disable"
When using lighttpd version 1.4.48 or higher, you can disable TLSv1 and TLSv1.1
as well:
    ssl.openssl.ssl-conf-cmd = ("Protocol" => "-TLSv1.1, -TLSv1, -SSLv3")
### The Cipher Suite
Forward Secrecy ensures the integrity of a session key in the event that a long-
term key is compromised. PFS accomplishes this by enforcing the derivation of a
new key for each and every session.
This means that when the private key gets compromised it cannot be used to
decrypt recorded SSL traffic.
The cipher suites that provide Perfect Forward Secrecy are those that use an
ephemeral form of the Diffie-Hellman key exchange. Their disadvantage is their
overhead, which can be improved by using the elliptic curve variants.
The following two ciphersuites are recommended by me, and the latter by [the
Mozilla Foundation][15].
The recommended cipher suite:
    ssl.cipher-list = "EECDH+AESGCM:EDH+AESGCM:AES128+EECDH:AES128+EDH"
The recommended cipher suite for backwards compatibility (IE6/WinXP):
If your version of OpenSSL is old, unavailable ciphers will be discarded
automatically. Always use the full ciphersuite above and let OpenSSL pick the
ones it supports.
The ordering of a ciphersuite is very important because it decides which
algorithms are going to be selected in priority. The recommendation above
prioritizes algorithms that provide perfect forward secrecy.
Older versions of OpenSSL may not return the full list of algorithms. AES-GCM
and some ECDHE are fairly recent, and not present on most versions of OpenSSL
shipped with Ubuntu or RHEL.
#### Prioritization logic
  * ECDHE+AESGCM ciphers are selected first. These are TLS 1.2 ciphers. No known attack currently target these ciphers.
  * PFS ciphersuites are preferred, with ECDHE first, then DHE.
  * AES 128 is preferred to AES 256. There has been [discussions][16] on whether AES256 extra security was worth the cost , and the result is far from obvious. At the moment, AES128 is preferred, because it provides good security, is really fa st, and seems to be more resistant to timing attacks.
  * In the backward compatible ciphersuite, AES is preferred to 3DES. BEAST attacks on AES are mitigated in TLS 1.1 and a bove, and difficult to achieve in TLS 1.0. In the non-backward compatible ciphersuite, 3DES is not present.
  * RC4 is removed entirely. 3DES is used for backward compatibility. See discussion in [#RC4_weaknesses][17]
#### Mandatory discards
  * aNULL contains non-authenticated Diffie-Hellman key exchanges, that are subject to Man-In-The-Middle (MITM) attacks
  * eNULL contains null-encryption ciphers (cleartext)
  * EXPORT are legacy weak ciphers that were marked as exportable by US law
  * RC4 contains ciphers that use the deprecated ARCFOUR algorithm
  * DES contains ciphers that use the deprecated Data Encryption Standard
  * SSLv2 contains all ciphers that were defined in the old version of the SSL standard, now deprecated
  * MD5 contains all the ciphers that use the deprecated message digest 5 as the hashing algorithm
### SSL Compression
The CRIME attack uses SSL Compression to do its magic, so we need to disable
that. The following option disables SSL compression:
    ssl.use-compression = "disable"
By default lighttpd disables SSL compression at compile time. If you find it to
be enabled, either use the above option, or recompile OpenSSL without ZLIB
support. This will disable the use of OpenSSL using the DEFLATE compression
method. If you do this then you can still use regular HTML DEFLATE compression.
### Forward Secrecy & Diffie Hellman Ephemeral Parameters
The concept of forward secrecy is simple: client and server negotiate a key that
never hits the wire, and is destroyed at the end of the session. The RSA private
from the server is used to sign a Diffie- Hellman key exchange between the
client and the server. The pre-master key obtained from the Diffie-Hellman
handshake is then used for encryption. Since the pre-master key is specific to a
connection between a client and a server, and used only for a limited amount of
time, it is called Ephemeral.
With Forward Secrecy, if an attacker gets a hold of the server's private key, it
will not be able to decrypt past communications. The private key is only used to
sign the DH handshake, which does not reveal the pre- master key. Diffie-Hellman
ensures that the pre-master keys never leave the client and the server, and
cannot be intercepted by a MITM.
All versions of lighttpd as of 1.4.7 rely on OpenSSL for input parameters to
Diffie-Hellman (DH). Unfortunately, this means that Ephemeral Diffie-Hellman
(DHE) will use OpenSSL's defaults, which include a 1024-bit key for the key-
exchange. Since we're using a 2048-bit certificate, DHE clients will use a
weaker key-exchange than non-ephemeral DH clients.
We need generate a stronger DHE parameter:
    openssl dhparam -out /etc/ssl/certs/dhparam.pem 4096
Add it you your lighttpd config:
    ssl.dh-file = "/etc/ssl/certs/dhparam.pem"
    ssl.ec-curve = "secp384r1"
### HTTP Strict Transport Security
When possible, you should enable [HTTP Strict Transport Security (HSTS)][18],
which instructs browsers to communicate with your site only over HTTPS.
[View my article on HTST to see how to configure it.][19]
### HTTP Public Key Pinning Extension
You should also enable the [HTTP Public Key Pinning Extension][20].
Public Key Pinning means that a certificate chain must include a whitelisted
public key. It ensures only whitelisted Certificate Authorities (CA) can sign
certificates for `*.example.com`, and not any CA in your browser store.
I've written an [article about it that has background theory and configuration
examples for Apache, Lighttpd and NGINX][21]
### Poodle and TLS-FALLBACK-SCSV
SSLv3 allows exploiting of the [POODLE][22] bug. This is one more major reason
to disable this.
Google have proposed an extension to SSL/TLS named [TLS _FALLBACK_ SCSV][23]
that seeks to prevent forced SSL downgrades. This is automatically enabled if
you upgrade OpenSSL to the following versions:
  * OpenSSL 1.0.1 has TLS _FALLBACK_ SCSV in 1.0.1j and higher.
  * OpenSSL 1.0.0 has TLS _FALLBACK_ SCSV in 1.0.0o and higher.
  * OpenSSL 0.9.8 has TLS _FALLBACK_ SCSV in 0.9.8zc and higher.
### BEAST attack
In short, by tampering with an encryption algorithm's CBC - cipher block
chaining - mode's, portions of the encrypted traffic can be secretly decrypted.
More info on the above link.
Recent browser versions have enabled client side mitigation for the beast
attack. The recommendation was to disable all TLS 1.0 ciphers and only offer
RC4. However, [RC4 has a growing list of attacks against
it],(http://www.isg.rhul.ac.uk/tls/) many of which have crossed the line from
theoretical to practical. Moreover, there is reason to believe that the NSA has
broken RC4, their so-called "big breakthrough."
Disabling RC4 has several ramifications. One, users with shitty browsers such as
Internet Explorer on Windows XP will use 3DES in lieu. Triple- DES is more
secure than RC4, but it is significantly more expensive. Your server will pay
the cost for these users. Two, RC4 mitigates BEAST. Thus, disabling RC4 makes
TLS 1.0 users susceptible to that attack, by moving them to AES-CBC (the usual
server-side BEAST "fix" is to prioritize RC4 above all else). I am confident
that the flaws in RC4 significantly outweigh the risks from BEAST. Indeed, with
client-side mitigation (which Chrome and Firefox both provide), BEAST is a
nonissue. But the risk from RC4 only grows: More cryptanalysis will surface over
### Factoring RSA-EXPORT Keys (FREAK)
FREAK is a man-in-the-middle (MITM) vulnerability discovered by a group of
cryptographers at [INRIA, Microsoft Research and IMDEA][24]. FREAK stands for
"Factoring RSA-EXPORT Keys."
The vulnerability dates back to the 1990s, when the US government banned selling
crypto software overseas, unless it used export cipher suites which involved
encryption keys no longer than 512-bits.
It turns out that some modern TLS clients - including Apple's SecureTransport
and OpenSSL - have a bug in them. This bug causes them to accept RSA export-
grade keys even when the client didn't ask for export-grade RSA. The impact of
this bug can be quite nasty: it admits a 'man in the middle' attack whereby an
active attacker can force down the quality of a connection, provided that the
client is vulnerable and the server supports export RSA.
There are two parts of the attack as the server must also accept "export grade
The MITM attack works as follows:
  * In the client's Hello message, it asks for a standard 'RSA' ciphersuite.
  * The MITM attacker changes this message to ask for 'export RSA'.
  * The server responds with a 512-bit export RSA key, signed with its long-term key.
  * The client accepts this weak key due to the OpenSSL/SecureTransport bug.
  * The attacker factors the RSA modulus to recover the corresponding RSA decryption key.
  * When the client encrypts the 'pre-master secret' to the server, the attacker can now decrypt it to recover the TLS 'm aster secret'.
  * From here on out, the attacker sees plaintext and can inject anything it wants.
The ciphersuite offered here on this page does not enable EXPORT grade ciphers.
Make sure your OpenSSL is updated to the latest available version and urge your
clients to also use upgraded software.
### Logjam (DH EXPORT)
[Researchers][25] from several universities and institutions conducted a study
that found an issue in the TLS protocol. In a report the researchers report two
attack methods.
Diffie-Hellman key exchange allows that depend on TLS to agree on a shared key
and negotiate a secure session over a plain text connection.
With the first attack, a man-in-the-middle can downgrade a vulnerable TLS
connection to 512-bit export-grade cryptography which would allow the attacker
to read and change the data. The second threat is that many servers and use the
same prime numbers for Diffie-Hellman key exchange instead of generating their
own unique DH parameters.
The team estimates that an academic team can break 768-bit primes and that a
nation-state could break a 1024-bit prime. By breaking one 1024-bit prime, one
could eavesdrop on 18 percent of the top one million HTTPS domains. Breaking a
second prime would open up 66 percent of VPNs and 26 percent of SSH servers.
Later on in this guide we generate our own unique DH parameters and we use a
ciphersuite that does not enable EXPORT grade ciphers. Make sure your OpenSSL is
updated to the latest available version and urge your clients to also use
upgraded software. Updated browsers refuse DH parameters lower than 768/1024 bit
as a fix to this.
[Cloudflare has a detailed guide][26] on logjam.
### Heartbleed
Heartbleed is a security bug disclosed in April 2014 in the OpenSSL cryptography
library, which is a widely used implementation of the Transport Layer Security
(TLS) protocol. Heartbleed may be exploited regardless of whether the party
using a vulnerable OpenSSL instance for TLS is a server or a client. It results
from improper input validation (due to a missing bounds check) in the
implementation of the DTLS heartbeat extension (RFC6520), thus the bug's name
derives from "heartbeat". The vulnerability is classified as a buffer over-read,
a situation where more data can be read than should be allowed.
What versions of the OpenSSL are affected by Heartbleed?
Status of different versions:
  * OpenSSL 1.0.1 through 1.0.1f (inclusive) are vulnerable
  * OpenSSL 1.0.1g is NOT vulnerable
  * OpenSSL 1.0.0 branch is NOT vulnerable
  * OpenSSL 0.9.8 branch is NOT vulnerable
The bug was introduced to OpenSSL in December 2011 and has been out in the wild
since OpenSSL release 1.0.1 on 14th of March 2012. OpenSSL 1.0.1g released on
7th of April 2014 fixes the bug.
By updating OpenSSL you are not vulnerable to this bug.
### Conclusion
If you have applied the above config lines you need to restart lighttpd:
    service lighttpd restart
Now use the [SSL Labs test][27] to see if you get a nice A+. And of course have
a safe and future proof SSL configuration!
   [1]: https://raymii.org/s/inc/img/ssl-labs-3.png
   [2]: https://www.ssllabs.com/ssltest/analyze.html?d=raymii.org
   [3]: https://raymii.org/s/software/OpenSSL_Decoder.html
   [4]: https://cipherli.st/
   [5]: https://www.digitalocean.com/?refcode=7435ae6b8212
   [6]: https://raymii.org/s/tutorials/Strong_SSL_Security_On_Apache2.html
   [7]: https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html
   [8]: http://www.bsdnow.tv/episodes/2014_08_20-engineering_nginx
   [9]: https://en.wikipedia.org/wiki/Transport_Layer_Security#BEAST_attack
   [10]: https://en.wikipedia.org/wiki/CRIME_%28security_exploit%29
   [11]: http://heartbleed.com/
   [12]: http://blog.cryptographyengineering.com/2015/03/attack-of-week-freak-or-factoring-nsa.html
   [13]: https://en.wikipedia.org/wiki/Perfect_forward_secrecy
   [14]: https://en.wikipedia.org/wiki/Transport_Layer_Security#Dealing_with_RC4_and_BEAST
   [15]: https://wiki.mozilla.org/Security/Server_Side_TLS
   [16]: http://www.mail-archive.com/dev-tech-crypto@lists.mozilla.org/msg11247.html
   [17]: https://wiki.mozilla.org/Security/Server_Side_TLS#RC4_weaknesses
   [18]: https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security
   [19]: https://raymii.org/s/tutorials/HTTP_Strict_Transport_Security_for_Apache_NGINX_and_Lighttpd.html
   [20]: https://wiki.mozilla.org/SecurityEngineering/Public_Key_Pinning
   [21]: https://raymii.org/s/articles/HTTP_Public_Key_Pinning_Extension_HPKP.html
   [22]: https://raymii.org/s/articles/Check_servers_for_the_Poodle_bug.html
   [23]: https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00
   [24]: https://www.smacktls.com/
   [25]: https://weakdh.org/
   [26]: https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/
   [27]: https://www.ssllabs.com/ssltest/
All the text on this website is free as in freedom unless stated otherwise. 
This means you can use it in any way you want, you can copy it, change it 
the way you like and republish it, as long as you release the (modified) 
content under the same license to give others the same freedoms you've got 
and place my name and a link to this site with the article as source.
This site uses Google Analytics for statistics and Google Adwords for 
advertisements. You are tracked and Google knows everything about you. 
Use an adblocker like ublock-origin if you don't want it.
All the code on this website is licensed under the GNU GPL v3 license 
unless already licensed under a license which does not allows this form 
of licensing or if another license is stated on that page / in that software:
    This program is free software: you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
    the Free Software Foundation, either version 3 of the License, or
    (at your option) any later version.
    This program is distributed in the hope that it will be useful,
    but WITHOUT ANY WARRANTY; without even the implied warranty of
    GNU General Public License for more details.
    You should have received a copy of the GNU General Public License
    along with this program.  If not, see .
Just to be clear, the information on this website is for meant for educational 
purposes and you use it at your own risk. I do not take responsibility if you 
screw something up. Use common sense, do not 'rm -rf /' as root for example. 
If you have any questions then do not hesitate to contact me.
See https://raymii.org/s/static/About.html for details.