| 
 
 
 | 
| Keep Server Online 
 If you find the Apache Lounge, the downloads and overall help useful, please express your satisfaction with a donation.
 
 or
 
 
   
 A donation makes a contribution towards the costs, the time and effort that's going in this site and building.
 
 Thank You! Steffen
 
 Your donations will help to keep this site alive and well, and continuing building binaries. Apache Lounge is not sponsored.
 |  | 
 | 
| | 
| | 
|  Topic: How to disable TLS 1.1 while enabling TLS 1.0? |  |  
| Author |  |  
| majidex 
 
 
 Joined: 31 Jul 2019
 Posts: 5
 Location: Japan
 
 | 
|  Posted: Wed 31 Jul '19 8:49    Post subject: How to disable TLS 1.1 while enabling TLS 1.0? |   |  
| 
 |  
| The ones I use are: 
  	  | Code: |  	  | D:\Apache24\bin>httpd.exe -v Server version: Apache/2.4.39 (Win64)
 Apache Lounge VS16 Server built:   May 28 2019 17:12:51
 
 D:\Apache24\bin>openssl.exe version
 OpenSSL 1.1.1c  28 May 2019
 | 
 We are currently migrating servers from Apache 2.2 to Apache 2.4.
 In order to maintain compatibility, while disabling TLS 1.1, I made the following settings to enable TLS 1.0.
 
  	  | Code: |  	  | SSLProtocol all -TLSv1.1 +TLSv1 | 
 However, disabling TLS 1.1 will also disable TLS 1.0 and will not work well.
 
 Is there anyone who knows how to set it up?
 |  |  
| Back to top |  |  
| James Blond Moderator
 
  
 Joined: 19 Jan 2006
 Posts: 7442
 Location: EU, Germany, Next to Hamburg
 
 | 
|  Posted: Wed 31 Jul '19 14:35    Post subject: |   |  
| 
 |  
| Use -all and enable only what you need. 
 
  	  | Code: |  	  | SSLProtocol -all +TLSv1 +WhatEverElse
 
 | 
 
 Example
 
 
  	  | Code: |  	  | SSLProtocol -all +TLSv1.2 +TLSv1.3
 
 | 
 |  |  
| Back to top |  |  
| majidex 
 
 
 Joined: 31 Jul 2019
 Posts: 5
 Location: Japan
 
 | 
|  Posted: Wed 31 Jul '19 15:41    Post subject: |   |  
| 
 |  
| Thank you for your reply. I tried, but still TLSv1 is not enabled.
 
 
  	  | Code: |  	  | SSLProtocol -all +TLSv1 +TLSv1.2 SSLProxyProtocol -all +TLSv1 +TLSv1.2
 | 
 
 Verified by openssl s_client
 
 
  	  | Code: |  	  | D:\Apache24\bin>openssl.exe s_client -connect localhost:443 -tls1 CONNECTED(00000104)
 3452:error:1409442E:SSL routines:ssl3_read_bytes:tlsv1 alert protocol version:ss
 l\record\rec_layer_s3.c:1536:SSL alert number 70
 ---
 no peer certificate available
 ---
 No client certificate CA names sent
 ---
 SSL handshake has read 7 bytes and written 104 bytes
 Verification: OK
 ---
 New, (NONE), Cipher is (NONE)
 Secure Renegotiation IS NOT supported
 Compression: NONE
 Expansion: NONE
 No ALPN negotiated
 SSL-Session:
 Protocol  : TLSv1
 Cipher    : 0000
 Session-ID:
 Session-ID-ctx:
 Master-Key:
 PSK identity: None
 PSK identity hint: None
 SRP username: None
 Start Time: 1564579968
 Timeout   : 7200 (sec)
 Verify return code: 0 (ok)
 Extended master secret: no
 ---
 | 
 
 Are there any shortages or omissions in the cipher suite? . .
 Here is the configuration of the cipher suite.
 
 
  	  | Code: |  	  | # default setting SSLCipherSuite HIGH:MEDIUM:!MD5:!RC4:!3DES
 SSLProxyCipherSuite HIGH:MEDIUM:!MD5:!RC4:!3DES
 | 
 |  |  
| Back to top |  |  
| James Blond Moderator
 
  
 Joined: 19 Jan 2006
 Posts: 7442
 Location: EU, Germany, Next to Hamburg
 
 | 
|  Posted: Wed 31 Jul '19 18:15    Post subject: |   |  
| 
 |  
| If you use a recent version of apache 2.4 from apache lounge which includes OpenSSL 1.1.1 
 
  	  | Code: |  	  | SSLOptions +StrictRequire +StdEnvVars -ExportCertData
 SSLProtocol -all +TLSv1.2 +TLSv1.3
 SSLCompression Off
 SSLHonorCipherOrder On
 SSLCipherSuite SSL ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384
 SSLCipherSuite TLSv1.3 TLS_CHACHA20_POLY1305_SHA256:TLS_AES_256_GCM_SHA384
 
 SSLOpenSSLConfCmd ECDHParameters secp384r1
 SSLOpenSSLConfCmd Curves sect571r1:sect571k1:secp521r1:sect409k1:sect409r1:secp384r1:sect283k1:sect283r1:secp256k1:prime256v1
 
 | 
 
 I would not use TLS 1.0 nor 1.1 any longer
 |  |  
| Back to top |  |  
 
 | 
 |  | 
 |  |