Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Last revision Both sides next revision | ||
litespeed_wiki:plesk:enable_tls_13 [2018/07/02 17:03] qtwrk |
litespeed_wiki:plesk:enable_tls_13 [2018/08/08 22:48] qtwrk [Disable Weak Cipher Suites (Optional)] |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | By default, Plesk configuration enables TLS1.0 , TLS1.1 and TLS1.2. This guide will show you how to enable TLS 1.3. This guide is made and tested on Plesk 17.8 and Centos 7.5, for Debian/Ubuntu Plesk ,configuration files should be located in /etc/apache2/mods-available/ssl.conf | + | ====== Enhance Plesk Security by Enabling TLS 1.3 ====== |
+ | You can enhance Plesk's security features by enabling TLS 1.3 and disabling weak cipher suites. | ||
+ | By default, Plesk configuration enables TLS1.0 , TLS1.1 and TLS1.2. This guide will show you how to enable TLS 1.3. | ||
+ | This guide is made and tested on Plesk 17.8 and Centos 7.5. For Debian/Ubuntu Plesk ,configuration files should be located in ''/etc/apache2/mods-available/ssl.conf''. | ||
+ | {{:litespeed_wiki:plesk:plesktls13-1.png|}} | ||
- | 1. Edit file ''/etc/httpd/conf.d/ssl.conf''. | + | ===== Enabling TLS1.3 ===== |
+ | Edit the file ''/etc/httpd/conf.d/ssl.conf''. | ||
+ | Find the following line and comment out (you can use # ): | ||
+ | <code><IfModule mod_ssl.c> | ||
+ | SSLProtocol +TLSv1 +TLSv1.1 +TLSv1.2 | ||
+ | SSLCipherSuite HIGH:!aNULL:!MD5 | ||
+ | </IfModule></code> | ||
- | Find following lines: | + | Replace it with: |
+ | <code><IfModule LiteSpeed> | ||
+ | SSLProtocol TLSv1.1 TLSv1.2 TLSv1.3 | ||
+ | SSLCipherSuite HIGH:!aNULL:!MD5 | ||
+ | </IfModule></code> | ||
- | <code>SSLProtocol +TLSv1 +TLSv1.1 +TLSv1.2</code> | + | This enables TLS1.1 , TLS1.2 and TLS1.3 |
- | + | {{:litespeed_wiki:plesk:plesktls13-2.png|}} | |
- | + | ||
- | Replace first line to the following: | + | |
- | + | ||
- | <code>SSLProtocol TLSv1.1 TLSv1.2 TLSv1.3</code> | + | |
- | + | ||
- | This is enables TLS1.1 , TLS1.2 and TLS1.3 | + | |
- | + | ||
- | so in case if you want to disable TLS1.1 as well, then make it: | + | |
+ | If you want to disable TLS1.1 as well, then change the line to: | ||
<code>SSLProtocol TLSv1.2 TLSv1.3</code> | <code>SSLProtocol TLSv1.2 TLSv1.3</code> | ||
+ | ===== Disable Weak Cipher Suites (Optional) ===== | ||
+ | {{:litespeed_wiki:plesk:plesktls13-3.jpg|}} | ||
- | + | By default, Plesk also comes with some weak cipher suites. If you want to disable them, find the following line: | |
- | + | ||
- | 2. If you also want to disable weak cipher suites, find the following lines: | + | |
<code>SSLCipherSuite HIGH:!aNULL:!MD5</code> | <code>SSLCipherSuite HIGH:!aNULL:!MD5</code> | ||
And replace it with: | And replace it with: | ||
+ | <code>SSLCipherSuite TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384:TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256:TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA:TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384:TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA:TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA:TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</code> | ||
- | <code>SSLCipherSuite TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384:TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256:TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA:TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384:TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA:TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA:TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</code> | + | {{:litespeed_wiki:plesk:plesktls13-4.png|}} |
Be aware, this may cause CPU load. | Be aware, this may cause CPU load. | ||
- | Test is done by SSL Lab | + | Testing is done through [[https://www.ssllabs.com/ssltest/|SSL Lab]]. |