Using SSLCipherSuite to restrict to faster cipher algorithms
Using SSLCipherSuite to restrict to faster cipher algorithms
am 15.12.2009 16:17:03 von dictoon
--00163646babce3dfa6047ac5e1d7
Content-Type: text/plain; charset=ISO-8859-1
Hello,
I have a setup where Apache 2.2.3 is serving a large SVN repository with
WebDAV over HTTPS (using basic authentication).
Everything is working correctly; I would simply like to force usage of
faster cipher algorithms (trading some security in favor of speed) than what
seems to be allowed right now (for instance, AES 256 is used when I connect
with Firefox).
My idea is that, by only allowing less secure but faster algorithms, all SVN
clients (command-line SVN or TortoiseSVN, for instance) will be forced to
use these faster algorithms, thus speeding up SVN operations.
I have played quite a bit with the SSLCipherSuite setting (at the virtual
host level), but I apparently cannot manage to force the client to specific
algorithms (RC4 for instance).
As an experiment, I have tried that (at the virtual host level):
SSLProtocol all -SSLv2
SSLHonorCipherOrder on
SSLCipherSuite ALL:!ADH:+RC4+RSA:!HIGH:!LOW:!EXP:!NULL
which, if I understand correctly, should force usage of RC4+RSA if
available, or other algorithms from the "medium" list:
$ openssl ciphers -v 'ALL:!ADH:+RC4+RSA:!HIGH:!LOW:!EXP:!NULL'
DHE-DSS-RC4-SHA SSLv3 Kx=DH Au=DSS Enc=RC4(128)
Mac=SHA1
KRB5-RC4-MD5 SSLv3 Kx=KRB5 Au=KRB5 Enc=RC4(128)
Mac=MD5
KRB5-RC4-SHA SSLv3 Kx=KRB5 Au=KRB5 Enc=RC4(128)
Mac=SHA1
RC2-CBC-MD5 SSLv2 Kx=RSA Au=RSA Enc=RC2(128)
Mac=MD5
RC4-SHA SSLv3 Kx=RSA Au=RSA Enc=RC4(128)
Mac=SHA1
RC4-MD5 SSLv3 Kx=RSA Au=RSA Enc=RC4(128)
Mac=MD5
RC4-MD5 SSLv2 Kx=RSA Au=RSA Enc=RC4(128)
Mac=MD5
Yet, Firefox still seems to be able to negotiate using AES 256. I am
puzzled.
Am I using the SSLCipherSuite setting correctly? Is there a way (possibly
another way) to achieve this optimization?
For information, I am using Apache/2.2.3 and OpenSSL 0.9.8b 04 May 2006 on
CentOS release 5.2 (Final).
Here is the relevant part of the virtual host configuration:
ServerName svn.mydomain.net:443
ServerAdmin "XXX"
DocumentRoot /var/www/vhosts/mydomain.net/subdomains/svn/httpdocs
CustomLog /var/www/vhosts/
mydomain.net/statistics/logs/access_ssl_log plesklog
ErrorLog /var/www/vhosts/mydomain.net/statistics/logs/error_log
SSLEngine on
SSLVerifyClient none
SSLCertificateFile /usr/local/psa/var/certificates/certVl10777
...
SSLProtocol all -SSLv2
SSLHonorCipherOrder on
DAV svn
SVNPath /var/www/vhosts/mydomain.net/svn/svnrepository
AuthzSVNAccessFile /var/www/vhosts/
mydomain.net/svn/svn-acl-file
Require valid-user
AuthType Basic
AuthName "Subversion Repository"
AuthUserFile /var/www/vhosts/mydomain.net/svn/svn-auth-file
SSLRequireSSL
Cheers,
Franz
--00163646babce3dfa6047ac5e1d7
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Hello,
I have a setup where Apache 2.2.3 is serving a la=
rge SVN repository=A0with WebDAV=A0over HTTPS (using basic authentication).=
Everything is working correctly; =A0I would simpl=
y like to force usage of faster cipher algorithms (trading some security in=
favor of speed) than what seems to be allowed right now (for instance, AES=
256 is used when I connect with Firefox).
My idea is that, by only allowing less secure but faste=
r algorithms, all SVN clients (command-line SVN or TortoiseSVN, for instanc=
e) will be forced to use these faster algorithms, thus speeding up SVN oper=
ations.
I have played quite a bit with the SSLCipherSuite setti=
ng (at the virtual host level), but I apparently cannot manage to force the=
client to specific algorithms (RC4 for instance).
As an experiment, I have tried that (at the virtual host level):
=
=A0 =A0 =A0SSLProtocol all -SSLv2
=A0=
=A0 =A0 =A0 =A0SSLHonorCipherOrder on
=A0 =A0 =A0SSLCipher=
Suite=A0ALL:!ADH:+RC4+RSA:!HIGH:!LOW:!EXP:!NULL
which, if I understand correctly, should force usa=
ge of RC4+RSA if available, or other algorithms from the "medium"=
list:
=A0 =A0 =A0$ openssl ciphers -v=
'ALL:!ADH:+RC4+RSA:!HIGH:!LOW:!EXP:!NULL'
=A0 =A0 =A0DHE-DSS-RC4-SHA =A0 =A0 =A0 =A0 SSLv3 Kx=3DDH =A0 =
=A0 =A0 Au=3DDSS =A0Enc=3DRC4(128) =A0Mac=3DSHA1
=A0 =A0 =
=A0KRB5-RC4-MD5 =A0 =A0 =A0 =A0 =A0 =A0SSLv3 Kx=3DKRB5 =A0 =A0 Au=3DKRB5 En=
c=3DRC4(128) =A0Mac=3DMD5
=A0 =A0 =A0KRB5-RC4-SHA =A0 =A0 =
=A0 =A0 =A0 =A0SSLv3 Kx=3DKRB5 =A0 =A0 Au=3DKRB5 Enc=3DRC4(128) =A0Mac=3DSH=
A1
=A0 =A0 =A0RC2-CBC-MD5 =A0 =A0 =A0 =A0 =A0 =A0 SSLv2 Kx=3DRSA =
=A0 =A0 =A0Au=3DRSA =A0Enc=3DRC2(128) =A0Mac=3DMD5
=A0 =A0=
=A0RC4-SHA =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 SSLv3 Kx=3DRSA =A0 =A0 =A0Au=3D=
RSA =A0Enc=3DRC4(128) =A0Mac=3DSHA1
=A0 =A0 =A0RC4-MD5 =A0=
=A0 =A0 =A0 =A0 =A0 =A0 =A0 SSLv3 Kx=3DRSA =A0 =A0 =A0Au=3DRSA =A0Enc=3DRC=
4(128) =A0Mac=3DMD5
=A0 =A0 =A0RC4-MD5 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 SSLv2 Kx=3DR=
SA =A0 =A0 =A0Au=3DRSA =A0Enc=3DRC4(128) =A0Mac=3DMD5
<=
div>Yet, Firefox still seems to be able to=A0negotiate=A0using AES 256. =A0=
I am puzzled.
Am I using the SSLCipherSuite setting correctly? =A0Is there a way (po=
ssibly another way) to achieve this optimization? =A0
<=
/div>
For information, I am using Apache/2.2.3 and OpenSSL 0.9.8b 04 Ma=
y 2006=A0on CentOS release 5.2 (Final).
Here is the relevant part of the virtual host configura=
tion:
<VirtualHost XXX.XXX.XXX.XXX:443>=
=A0 =A0 =A0ServerName
443">svn.mydomain.net:443
=A0 =A0 =A0ServerAdmin "XXX"
> =A0 =A0 =A0DocumentRoot /var/www/vhosts/
net/subdomains/svn/httpdocs">mydomain.net/subdomains/svn/htt pdocs
=
=A0 =A0 =A0CustomLog =A0/var/www/vhosts/
ain.net/statistics/logs/access_ssl_log">mydomain.net/statist ics/logs/access=
_ssl_log plesklog
=A0 =A0 =A0ErrorLog =A0/var/www/vhosts/
in.net/statistics/logs/error_log">mydomain.net/statistics/lo gs/error_log
>
=A0 =A0 =A0SSLEngine on
=
=A0 =A0 =A0SSLVerifyClient none
=A0 =A0 =A0SSLCertificateFile /usr/local/psa/var/certificates/c=
ertVl10777
=A0 =A0 =A0 =A0 =A0 =A0 =A0...
=A0 =A0 =A0<=
/Directory>
=A0 =A0 =A0SSLProtocol all -=
SSLv2
=A0 =A0 =A0SSLHonorCipherOrder on
v>
=A0 =A0 =A0<Location />
=A0 =A0 =A0 =A0 =A0 =A0 =A0DAV svn
=A0 =A0 =
=A0 =A0 =A0 =A0SVNPath /var/www/vhosts/
vnrepository">mydomain.net/svn/svnrepository
=A0 =A0=
=A0 =A0 =A0 =A0AuthzSVNAccessFile /var/www/vhosts/
mydomain.net/svn/svn-acl-file">mydomain.net/svn/svn-acl-file
=A0 =A0 =A0 =A0 =A0 =A0Require valid-user
=A0=
=A0 =A0 =A0 =A0 =A0 =A0 =A0AuthType Basic
=A0 =
=A0 =A0 =A0 =A0 =A0AuthName "Subversion Repository"
=A0=
=A0 =A0 =A0 =A0 =A0 =A0 =A0AuthUserFile /var/www/vhosts/
tp://mydomain.net/svn/svn-auth-file">mydomain.net/svn/svn-au th-file
v>
=A0 =A0 =A0 =A0 =A0 =A0SSLRequireSSL
=A0=
=A0 =A0</Location>
</VirtualHost>
v>
Cheers,
Franz
--00163646babce3dfa6047ac5e1d7--
Re: Using SSLCipherSuite to restrict to faster cipheralgorithms
am 15.12.2009 20:26:21 von Justin Pasher
François Beaune wrote:
> Hello,
>
> I have a setup where Apache 2.2.3 is serving a large SVN
> repository with WebDAV over HTTPS (using basic authentication).
>
> Everything is working correctly; I would simply like to force usage
> of faster cipher algorithms (trading some security in favor of speed)
> than what seems to be allowed right now (for instance, AES 256 is used
> when I connect with Firefox).
[snip]
> As an experiment, I have tried that (at the virtual host level):
>
> SSLProtocol all -SSLv2
> SSLHonorCipherOrder on
> SSLCipherSuite ALL:!ADH:+RC4+RSA:!HIGH:!LOW:!EXP:!NULL
I noticed that your VirtualHost container doesn't actually contain the
SSLCipherSuite directive. Are you defining that somewhere else, such as
in the global config scope? Double check to make sure that it's being
defined globally as opposed to being wrapped inside another container
object.
Also, you can use this script to check which ciphers are supported by
your site.
http://www.lazorsoftware.com/lazorsoft/files/openssl_check.s h
--
Justin Pasher
------------------------------------------------------------ ---------
The official User-To-User support forum of the Apache HTTP Server Project.
See for more info.
To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org
" from the digest: users-digest-unsubscribe@httpd.apache.org
For additional commands, e-mail: users-help@httpd.apache.org
Re: Using SSLCipherSuite to restrict to faster cipher
am 16.12.2009 08:47:37 von dictoon
--0016e659f7b270ac79047ad3b811
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Hey Justin,
Thanks for your answer. I did add the various versions of
the SSLCipherSuite directive to my virtual host container, sorry if that
wasn't clear.
In the meantime I found that, by inspecting the handshake between
TortoiseSVN and Apache, the connection does use RC4, which is good. Still,
I don't understand why this doesn't happen with Firefox (it always uses AES
256, which shouldn't be allowed, if I understand things correctly). Any
clue?
Cheers,
Franz
On Tue, Dec 15, 2009 at 8:26 PM, Justin Pasher
wrote:
> Fran=E7ois Beaune wrote:
>
>> Hello,
>>
>> I have a setup where Apache 2.2.3 is serving a large SVN repository with
>> WebDAV over HTTPS (using basic authentication).
>>
>> Everything is working correctly; I would simply like to force usage of
>> faster cipher algorithms (trading some security in favor of speed) than =
what
>> seems to be allowed right now (for instance, AES 256 is used when I conn=
ect
>> with Firefox).
>>
>
> [snip]
>
>
> As an experiment, I have tried that (at the virtual host level):
>>
>> SSLProtocol all -SSLv2
>> SSLHonorCipherOrder on
>> SSLCipherSuite ALL:!ADH:+RC4+RSA:!HIGH:!LOW:!EXP:!NULL
>>
>
> I noticed that your VirtualHost container doesn't actually contain the
> SSLCipherSuite directive. Are you defining that somewhere else, such as i=
n
> the global config scope? Double check to make sure that it's being define=
d
> globally as opposed to being wrapped inside another container object.
>
> Also, you can use this script to check which ciphers are supported by you=
r
> site.
>
> http://www.lazorsoftware.com/lazorsoft/files/openssl_check.s h
>
> --
> Justin Pasher
>
> ------------------------------------------------------------ ---------
> The official User-To-User support forum of the Apache HTTP Server Project=
..
> See for more info.
> To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org
> " from the digest: users-digest-unsubscribe@httpd.apache.org
> For additional commands, e-mail: users-help@httpd.apache.org
>
>
--0016e659f7b270ac79047ad3b811
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Hey Justin,
Thanks for your answer. =A0I did add the var=
ious versions of the=A0SSLCipherSuite directive to=A0my virtual host contai=
ner, sorry if that wasn't clear.
In the meanti=
me I found that, by inspecting the handshake between TortoiseSVN and Apache=
, the connection does use RC4, which is good. =A0Still, I don't underst=
and why this doesn't happen with Firefox (it always uses AES 256, which=
shouldn't be allowed, if I understand=A0things correctly). =A0Any clue=
?
Cheers,
Franz
iv class=3D"gmail_quote">On Tue, Dec 15, 2009 at 8:26 PM, Justin Pasher
an dir=3D"ltr"><
justinp@n=
ewmediagateway.com> wrote:
x #ccc solid;padding-left:1ex;">
Fran=E7ois Beaune wrote:<=
br>
x #ccc solid;padding-left:1ex">
Hello,
I have a setup where Apache 2.2.3 is serving a large SVN repository with We=
bDAV over HTTPS (using basic authentication).
Everything is working correctly; =A0I would simply like to force usage of f=
aster cipher algorithms (trading some security in favor of speed) than what=
seems to be allowed right now (for instance, AES 256 is used when I connec=
t with Firefox).
[snip]
x #ccc solid;padding-left:1ex">
As an experiment, I have tried that (at the virtual host level):
=A0 =A0 =A0 =A0SSLProtocol all -SSLv2
=A0 =A0 =A0 =A0SSLHonorCipherOrder on
=A0 =A0 =A0 =A0SSLCipherSuite ALL:!ADH:+RC4+RSA:!HIGH:!LOW:!EXP:!NULL
I noticed that your VirtualHost container doesn't actually contain the =
SSLCipherSuite directive. Are you defining that somewhere else, such as in =
the global config scope? Double check to make sure that it's being defi=
ned globally as opposed to being wrapped inside another container object.
r>
Also, you can use this script to check which ciphers are supported by your =
site.
arget=3D"_blank">http://www.lazorsoftware.com/lazorsoft/file s/openssl_check=
..sh
--
Justin Pasher
------------------------------------------------------------ ---------
The official User-To-User support forum of the Apache HTTP Server Project.<=
br>
See <URL:
lank">http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail:
g" target=3D"_blank">users-unsubscribe@httpd.apache.org
=A0" =A0 from the digest:
httpd.apache.org" target=3D"_blank">users-digest-unsubscribe@httpd.apache.o=
rg
For additional commands, e-mail:
org" target=3D"_blank">users-help@httpd.apache.org
--0016e659f7b270ac79047ad3b811--
Re: Using SSLCipherSuite to restrict to faster cipher algorithms
am 16.12.2009 17:03:56 von Justin Pasher
François Beaune wrote:
> Hey Justin,
>
> Thanks for your answer. I did add the various versions of
> the SSLCipherSuite directive to my virtual host container, sorry if
> that wasn't clear.
>
> In the meantime I found that, by inspecting the handshake between
> TortoiseSVN and Apache, the connection does use RC4, which is good.
> Still, I don't understand why this doesn't happen with Firefox (it
> always uses AES 256, which shouldn't be allowed, if I
> understand things correctly). Any clue?
Did you try running the shell script to verify that the server is
correctly applying the SSLCipherSuite directive and only offering the
ciphers you have allowed?
http://www.lazorsoftware.com/lazorsoft/files/openssl_check.s h
--
Justin Pasher
------------------------------------------------------------ ---------
The official User-To-User support forum of the Apache HTTP Server Project.
See for more info.
To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org
" from the digest: users-digest-unsubscribe@httpd.apache.org
For additional commands, e-mail: users-help@httpd.apache.org
Re: Using SSLCipherSuite to restrict to faster cipher
am 16.12.2009 18:27:39 von dictoon
--0016364c7054c2e0a8047adbd25c
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
On Wed, Dec 16, 2009 at 5:03 PM, Justin Pasher
wrote:
> Fran=E7ois Beaune wrote:
>
>> Hey Justin,
>>
>> Thanks for your answer. I did add the various versions of the
>> SSLCipherSuite directive to my virtual host container, sorry if that was=
n't
>> clear.
>>
>> In the meantime I found that, by inspecting the handshake between
>> TortoiseSVN and Apache, the connection does use RC4, which is good. Sti=
ll,
>> I don't understand why this doesn't happen with Firefox (it always uses =
AES
>> 256, which shouldn't be allowed, if I understand things correctly). Any
>> clue?
>>
>
> Did you try running the shell script to verify that the server is correct=
ly
> applying the SSLCipherSuite directive and only offering the ciphers you h=
ave
> allowed?
>
>
> http://www.lazorsoftware.com/lazorsoft/files/openssl_check.s h
>
>
Sorry, I had overlooked your suggestion. Here's the output of the script:
$ ./openssl_check.sh svn.mydomain.net
Checking svn.mydomain.net:443 ...
- DHE-DSS-RC4-SHA
- EXP1024-DHE-DSS-RC4-SHA
+ EXP1024-RC4-SHA at Server public key is 2048 bit
- EXP1024-DHE-DSS-DES-CBC-SHA
+ EXP1024-DES-CBC-SHA at Server public key is 2048 bit
- ADH-AES256-SHA
+ DHE-RSA-AES256-SHA at Server public key is 2048 bit
- DHE-DSS-AES256-SHA
+ AES256-SHA at Server public key is 2048 bit
- ADH-AES128-SHA
+ DHE-RSA-AES128-SHA at Server public key is 2048 bit
- DHE-DSS-AES128-SHA
+ AES128-SHA at Server public key is 2048 bit
- EXP-KRB5-RC4-MD5
- EXP-KRB5-RC2-CBC-MD5
- EXP-KRB5-DES-CBC-MD5
- EXP-KRB5-RC4-SHA
- EXP-KRB5-RC2-CBC-SHA
- EXP-KRB5-DES-CBC-SHA
- KRB5-RC4-MD5
- KRB5-DES-CBC3-MD5
- KRB5-DES-CBC-MD5
- KRB5-RC4-SHA
- KRB5-DES-CBC3-SHA
- KRB5-DES-CBC-SHA
- ADH-DES-CBC3-SHA
- ADH-DES-CBC-SHA
- EXP-ADH-DES-CBC-SHA
- ADH-RC4-MD5
- EXP-ADH-RC4-MD5
+ EDH-RSA-DES-CBC3-SHA at Server public key is 2048 bit
+ EDH-RSA-DES-CBC-SHA at Server public key is 2048 bit
+ EXP-EDH-RSA-DES-CBC-SHA at Server public key is 2048 bit
- EDH-DSS-DES-CBC3-SHA
- EDH-DSS-DES-CBC-SHA
- EXP-EDH-DSS-DES-CBC-SHA
+ DES-CBC3-SHA at Server public key is 2048 bit
+ DES-CBC-SHA at Server public key is 2048 bit
+ EXP-DES-CBC-SHA at Server public key is 2048 bit
+ EXP-RC2-CBC-MD5 at Server public key is 2048 bit
+ RC4-SHA at Server public key is 2048 bit
+ RC4-MD5 at Server public key is 2048 bit
+ EXP-RC4-MD5 at Server public key is 2048 bit
- DES-CBC3-MD5
- DES-CBC-MD5
+ EXP-RC2-CBC-MD5 at Server public key is 2048 bit
- RC2-CBC-MD5
+ EXP-RC4-MD5 at Server public key is 2048 bit
+ RC4-MD5 at Server public key is 2048 bit
- NULL-SHA
- NULL-MD5
I suspect this isn't correct though, as the list stays the same regardless
of how I set SSLCipherSuite (I did restart Apache after each change to
SSLCipherSuite). Either I'm not using the script correctly, or I'm not
setting SSLCipherSuite correctly, or I'm doing another error. Any idea?
Thanks for your help.
Cheers,
Franz
--0016364c7054c2e0a8047adbd25c
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex;">
Fran=E7ois Beaune wrote:
x #ccc solid;padding-left:1ex">
Hey Justin,
Thanks for your answer. =A0I did add the various versions of the SSLCipherS=
uite directive to my virtual host container, sorry if that wasn't clear=
..
In the meantime I found that, by inspecting the handshake between TortoiseS=
VN and Apache, the connection does use RC4, which is good. =A0Still, I don&=
#39;t understand why this doesn't happen with Firefox (it always uses A=
ES 256, which shouldn't be allowed, if I understand things correctly). =
=A0Any clue?
Did you try running the shell script to verify that the server is correctly=
applying the SSLCipherSuite directive and only offering the ciphers you ha=
ve allowed?
arget=3D"_blank">http://www.lazorsoftware.com/lazorsoft/file s/openssl_check=
..sh
Sorry, I had overlooked yo=
ur suggestion. =A0Here's the output of the script:
=
- DHE-DSS-RC4-SHA
- EXP1024-DHE-DSS=
-RC4-SHA
+ EXP1024-RC4-SHA at Server public key is 2048 bit=
- EXP1024-DHE-DSS-DES-CBC-SHA
+ EXP1024-DES-CBC-SHA a=
t Server public key is 2048 bit
- ADH-AES256-SHA
=
+ DHE-RSA-AES256-SHA at Server public key is 2048 bit
=A0=
=A0- DHE-DSS-AES256-SHA
+ AES256-SHA at Server public key is 2048 bit
- =
ADH-AES128-SHA
+ DHE-RSA-AES128-SHA at Server public key is=
2048 bit
- DHE-DSS-AES128-SHA
+ AES128-SHA=
at Server public key is 2048 bit
- EXP-KRB5-RC4-MD5
- EXP-KRB5-RC2-CBC-MD5
<=
div> - EXP-KRB5-DES-CBC-MD5
- EXP-KRB5-RC4-SHA
iv> - EXP-KRB5-RC2-CBC-SHA
- EXP-KRB5-DES-CBC-SHA
>
- KRB5-RC4-MD5
- KRB5-DES-CBC3-MD5
- KRB5-DES-CBC-MD5
> - KRB5-RC4-SHA
- KRB5-DES-CBC3-SHA
-=
KRB5-DES-CBC-SHA
- ADH-DES-CBC3-SHA
- ADH-=
DES-CBC-SHA
- EXP-ADH-DES-CBC-SHA
- ADH-RC4-MD5
- EXP-ADH-RC4-MD5
=
+ EDH-RSA-DES-CBC3-SHA at Server public key is 2048 bit
+ E=
DH-RSA-DES-CBC-SHA at Server public key is 2048 bit
+ EXP-E=
DH-RSA-DES-CBC-SHA at Server public key is 2048 bit
- EDH-DSS-DES-CBC3-SHA
- EDH-DSS-DES-CBC-SHA
v>
- EXP-EDH-DSS-DES-CBC-SHA
+ DES-CBC3-SHA at Se=
rver public key is 2048 bit
+ DES-CBC-SHA at Server public =
key is 2048 bit
+ EXP-DES-CBC-SHA at Server public key is 2048 bit
=A0=
=A0+ EXP-RC2-CBC-MD5 at Server public key is 2048 bit
+ RC4=
-SHA at Server public key is 2048 bit
+ RC4-MD5 at Server p=
ublic key is 2048 bit
+ EXP-RC4-MD5 at Server public key is 2048 bit
-=
DES-CBC3-MD5
- DES-CBC-MD5
+ EXP-RC2-CBC-M=
D5 at Server public key is 2048 bit
- RC2-CBC-MD5
> + EXP-RC4-MD5 at Server public key is 2048 bit
+ RC4-MD5 at Server public key is 2048 bit
- NUL=
L-SHA
- NULL-MD5
I suspect this is=
n't correct though, as the list stays the same regardless of how I set =
SSLCipherSuite (I did restart Apache after each change to SSLCipherSuite). =
=A0Either I'm not using the script correctly, or I'm not setting SS=
LCipherSuite correctly, or I'm doing another error. =A0Any idea?
Thanks for your help.
Ch=
eers,
Franz
--0016364c7054c2e0a8047adbd25c--
Re: Using SSLCipherSuite to restrict to faster cipher algorithms
am 16.12.2009 19:00:33 von Justin Pasher
François Beaune wrote:
> Sorry, I had overlooked your suggestion. Here's the output of the script:
>
> $ ./openssl_check.sh svn.mydomain.net
> Checking svn.mydomain.net:443 ...
> + EXP1024-RC4-SHA at Server public key is 2048 bit
> + EXP1024-DES-CBC-SHA at Server public key is 2048 bit
> + DHE-RSA-AES256-SHA at Server public key is 2048 bit
> + AES256-SHA at Server public key is 2048 bit
> + DHE-RSA-AES128-SHA at Server public key is 2048 bit
> + AES128-SHA at Server public key is 2048 bit
> + EDH-RSA-DES-CBC3-SHA at Server public key is 2048 bit
> + EDH-RSA-DES-CBC-SHA at Server public key is 2048 bit
> + EXP-EDH-RSA-DES-CBC-SHA at Server public key is 2048 bit
> + DES-CBC3-SHA at Server public key is 2048 bit
> + DES-CBC-SHA at Server public key is 2048 bit
> + EXP-DES-CBC-SHA at Server public key is 2048 bit
> + EXP-RC2-CBC-MD5 at Server public key is 2048 bit
> + RC4-SHA at Server public key is 2048 bit
> + RC4-MD5 at Server public key is 2048 bit
> + EXP-RC4-MD5 at Server public key is 2048 bit
> + EXP-RC2-CBC-MD5 at Server public key is 2048 bit
> + EXP-RC4-MD5 at Server public key is 2048 bit
> + RC4-MD5 at Server public key is 2048 bit
>
> I suspect this isn't correct though, as the list stays the same
> regardless of how I set SSLCipherSuite (I did restart Apache after
> each change to SSLCipherSuite). Either I'm not using the script
> correctly, or I'm not setting SSLCipherSuite correctly, or I'm doing
> another error. Any idea?
Everything with a plus sign is a cipher that is accepted by your apache
server, so given these results, the SSLCipherSuite directive is not
being registered.
Here is the SSLCipherSuite directive that I use on my servers to lock
out insecure ciphers:
SSLCipherSuite AES256-SHA:DES-CBC3-SHA:AES128-SHA:RC4-SHA:RC4-MD5
Try setting your config to this value. Obviously this is different than
what you are trying to accomplish, but right now the goal is to figure
out whether the SSLCipherSuite directive is actually being acknowledged.
When you run the openssl_check.sh script again, it should return the
following results:
+ AES256-SHA at Server public key is 1024 bit
+ AES128-SHA at Server public key is 1024 bit
+ DES-CBC3-SHA at Server public key is 1024 bit
+ RC4-SHA at Server public key is 1024 bit
+ RC4-MD5 at Server public key is 1024 bit
+ RC4-MD5 at Server public key is 1024 bit
If you see anything different, then the SSLCipherSuite is not being set
properly. Double check that you don't have multiple SSLCipherSuite
directives set across different files. Also make sure you are not
accidentally setting it within an unintentional container, such as
or . I know that on CentOS, the default config
file that has the SSL directives actually contains the SSLCipherSuite
directive within a container. That threw me off recently
when I was trying to setup apache on a CentOS box for the first time.
--
Justin Pasher
------------------------------------------------------------ ---------
The official User-To-User support forum of the Apache HTTP Server Project.
See for more info.
To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org
" from the digest: users-digest-unsubscribe@httpd.apache.org
For additional commands, e-mail: users-help@httpd.apache.org
Re: Using SSLCipherSuite to restrict to faster cipher
am 17.12.2009 11:57:53 von dictoon
--0016364d232bae093c047aea7e62
Content-Type: text/plain; charset=ISO-8859-1
On Wed, Dec 16, 2009 at 7:00 PM, Justin Pasher
wrote:
[snip]
Here is the SSLCipherSuite directive that I use on my servers to lock out
> insecure ciphers:
>
> SSLCipherSuite AES256-SHA:DES-CBC3-SHA:AES128-SHA:RC4-SHA:RC4-MD5
>
> Try setting your config to this value. Obviously this is different than
> what you are trying to accomplish, but right now the goal is to figure out
> whether the SSLCipherSuite directive is actually being acknowledged. When
> you run the openssl_check.sh script again, it should return the following
> results:
>
> + AES256-SHA at Server public key is 1024 bit
> + AES128-SHA at Server public key is 1024 bit
> + DES-CBC3-SHA at Server public key is 1024 bit
> + RC4-SHA at Server public key is 1024 bit
> + RC4-MD5 at Server public key is 1024 bit
> + RC4-MD5 at Server public key is 1024 bit
>
> If you see anything different, then the SSLCipherSuite is not being set
> properly. Double check that you don't have multiple SSLCipherSuite
> directives set across different files. Also make sure you are not
> accidentally setting it within an unintentional container, such as
> or . I know that on CentOS, the default config file
> that has the SSL directives actually contains the SSLCipherSuite directive
> within a container. That threw me off recently when I was
> trying to setup apache on a CentOS box for the first time.
I'm still getting the same list, even if I use the SSLCipherSuite you
suggested, so it's clearly not used.
On my side (in my subdomain's configuration), I only have one
SSLCipherSuite occurrence, inside the container I shown
earlier in this thread (and it's not in a or
container).
That being said, in /etc/httpd/conf.d/ssl.conf, there is another occurrence:
...
SSLEngine on
SSLProtocol all -SSLv2
SSLCipherSuite ALL:!ADH:!EXPORT:!SSLv2:RC4+RSA:+HIGH:+MEDIUM:+LOW
...
Shouldn't my configuration file have precedence over that?
Cheers,
Franz
--0016364d232bae093c047aea7e62
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
er-left:1px #ccc solid;padding-left:1ex;">
Here is the SSLCipherSuite directive that I use on my servers to lock out i=
nsecure ciphers:
SSLCipherSuite AES256-SHA:DES-CBC3-SHA:AES128-SHA:RC4-SHA:RC4-MD5
Try setting your config to this value. Obviously this is different than wha=
t you are trying to accomplish, but right now the goal is to figure out whe=
ther the SSLCipherSuite directive is actually being acknowledged. When you =
run the openssl_check.sh script again, it should return the following resul=
ts:
=A0+ AES256-SHA at Server public key is 1024 bit
=A0+ AES128-SHA at Server public key is 1024 bit
=A0+ DES-CBC3-SHA at Server public key is 1024 bit
=A0+ RC4-SHA at Server public key is 1024 bit
=A0+ RC4-MD5 at Server public key is 1024 bit
=A0+ RC4-MD5 at Server public key is 1024 bit
ex;border-left:1px #ccc solid;padding-left:1ex;">If you see anything differ=
ent, then the SSLCipherSuite is not being set properly. Double check that y=
ou don't have multiple SSLCipherSuite directives set across different f=
iles. Also make sure you are not accidentally setting it within an unintent=
ional container, such as <Directory> or <VirtualHost>. I know t=
hat on CentOS, the default config file that has the SSL directives actually=
contains the SSLCipherSuite directive within a <VirtualHost> contain=
er. That threw me off recently when I was trying to setup apache on a CentO=
S box for the first time.
I'm still getting the same list, even if I use the =
SSLCipherSuite you suggested, so it's clearly not used.
<=
/div>
On my side (in my subdomain's configuration), I only have one=
SSLCipherSuite=A0occurrence, inside the <VirtualHost> container I sh=
own earlier in this thread (and it's not in a <Location> or <D=
irectory> container).
That being said, in /etc/httpd/conf.d/ssl.conf, there i=
s another occurrence:
=A0<VirtualHost _d=
efault_:443>
=A0 =A0 =A0...
=A0 =
=A0 =A0SSLEngine on
=A0 =A0 =A0SSLProtocol all -SSLv2
=A0 =A0 =A0S=
SLCipherSuite ALL:!ADH:!EXPORT:!SSLv2:RC4+RSA:+HIGH:+MEDIUM:+LOW
=
=A0 =A0 =A0...
=A0</VirtualHost>
<=
div>
Shouldn't my configuration file have pre=
cedence over that?
--0016364d232bae093c047aea7e62--
Re: Using SSLCipherSuite to restrict to faster cipher algorithms
am 17.12.2009 18:21:24 von Justin Pasher
François Beaune wrote:
> On Wed, Dec 16, 2009 at 7:00 PM, Justin Pasher
> > wrote:
>
> [snip]
>
> Here is the SSLCipherSuite directive that I use on my servers to
> lock out insecure ciphers:
>
> SSLCipherSuite AES256-SHA:DES-CBC3-SHA:AES128-SHA:RC4-SHA:RC4-MD5
>
>
> I'm still getting the same list, even if I use the SSLCipherSuite you
> suggested, so it's clearly not used.
>
> On my side (in my subdomain's configuration), I only have one
> SSLCipherSuite occurrence, inside the container I shown
> earlier in this thread (and it's not in a or
> container).
>
> That being said, in /etc/httpd/conf.d/ssl.conf, there is another
> occurrence:
>
>
> ...
> SSLEngine on
> SSLProtocol all -SSLv2
> SSLCipherSuite ALL:!ADH:!EXPORT:!SSLv2:RC4+RSA:+HIGH:+MEDIUM:+LOW
> ...
>
>
> Shouldn't my configuration file have precedence over that?
So now we know how Firefox is still using AES256. It's just a matter of
figuring out why the SSLCipherSuite is not being used. The first thing
I'd try is replacing the SSLCipherSuite directory you found above
(inside the container). If that fixes the
problem, then you at least know where it's picking up the setting. As
far as WHY it's hitting that VirtualHost container, Apache should be
falling back to that one if there is no other matching
container for the request. Looking back at the original post, I see this...
ServerName svn.mydomain.net:443
....
So I assume that the request is actually being made to the (masked) IP
address XXX.XXX.XXX.XXX? One thought out from left field would be that
the box has multiple IP addresses assigned and the request is actually
hitting YYY.YYY.YYY.YYY instead of XXX.XXX.XXX.XXX, which would make it
fall back to the default VirtualHost:443, I believe. Also, if you are
trying to access the server via localhost, that would be coming from a
different IP address (127.0.0.1), so it would also fall back to the
default. Additional note: you don't need the ":443" on the ServerName.
Now, if changing the SSLCipherSuite in the default VirtualHost does NOT
register the change, then it would sound like it's not hitting ANY of
the VirtualHost containers that have SSLCipherSuite defined. If that
really is the case, you could always put the SSLCipherSuite in the
global scope as a last resort, but ideally you could figure out why it's
not recognizing the setting.
--
Justin Pasher
------------------------------------------------------------ ---------
The official User-To-User support forum of the Apache HTTP Server Project.
See for more info.
To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org
" from the digest: users-digest-unsubscribe@httpd.apache.org
For additional commands, e-mail: users-help@httpd.apache.org
Re: Using SSLCipherSuite to restrict to faster cipher
am 25.12.2009 20:14:48 von dictoon
--002215b01c4a8bc81f047b925e81
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
On Thu, Dec 17, 2009 at 6:21 PM, Justin Pasher
wrote:
> Fran=E7ois Beaune wrote:
[snip]
> I'm still getting the same list, even if I use the SSLCipherSuite you
>> suggested, so it's clearly not used.
>>
>> On my side (in my subdomain's configuration), I only have one
>> SSLCipherSuite occurrence, inside the container I shown
>> earlier in this thread (and it's not in a or
>> container).
>>
>> That being said, in /etc/httpd/conf.d/ssl.conf, there is another
>> occurrence:
>>
>>
>> ...
>> SSLEngine on
>> SSLProtocol all -SSLv2
>> SSLCipherSuite ALL:!ADH:!EXPORT:!SSLv2:RC4+RSA:+HIGH:+MEDIUM:+LOW
>> ...
>>
>>
>> Shouldn't my configuration file have precedence over that?
>>
>
> So now we know how Firefox is still using AES256. It's just a matter of
> figuring out why the SSLCipherSuite is not being used. The first thing I'=
d
> try is replacing the SSLCipherSuite directory you found above (inside the
> container). If that fixes the problem, then y=
ou
> at least know where it's picking up the setting. As far as WHY it's hitti=
ng
> that VirtualHost container, Apache should be falling back to that one if
> there is no other matching container for the request. Looki=
ng
> back at the original post, I see this...
>
>
>
> ServerName svn.mydomain.net:443
> ...
>
>
> So I assume that the request is actually being made to the (masked) IP
> address XXX.XXX.XXX.XXX? One thought out from left field would be that th=
e
> box has multiple IP addresses assigned and the request is actually hittin=
g
> YYY.YYY.YYY.YYY instead of XXX.XXX.XXX.XXX, which would make it fall back=
to
> the default VirtualHost:443, I believe. Also, if you are trying to access
> the server via localhost, that would be coming from a different IP addres=
s
> (127.0.0.1), so it would also fall back to the default. Additional note: =
you
> don't need the ":443" on the ServerName.
>
> Now, if changing the SSLCipherSuite in the default VirtualHost does NOT
> register the change, then it would sound like it's not hitting ANY of the
> VirtualHost containers that have SSLCipherSuite defined. If that really i=
s
> the case, you could always put the SSLCipherSuite in the global scope as =
a
> last resort, but ideally you could figure out why it's not recognizing th=
e
> setting.
>
Getting back to this problem only now.
I tried changing the SSLCipherSuite directive in /etc/httpd/conf.d/ssl.conf
(in the container), but that had no effect.
However, I also tried adding a global SSLCipherSuite directive outside any
container, and that had the intended effect:
$ ./openssl_check.sh svn.mydomain.net
Checking svn.mydomain.net:443 ...
- DHE-DSS-RC4-SHA
- EXP1024-DHE-DSS-RC4-SHA
- EXP1024-RC4-SHA
- EXP1024-DHE-DSS-DES-CBC-SHA
- EXP1024-DES-CBC-SHA
- ADH-AES256-SHA
- DHE-RSA-AES256-SHA
- DHE-DSS-AES256-SHA
+ AES256-SHA at Server public key is 2048 bit
- ADH-AES128-SHA
- DHE-RSA-AES128-SHA
- DHE-DSS-AES128-SHA
+ AES128-SHA at Server public key is 2048 bit
- EXP-KRB5-RC4-MD5
- EXP-KRB5-RC2-CBC-MD5
- EXP-KRB5-DES-CBC-MD5
- EXP-KRB5-RC4-SHA
- EXP-KRB5-RC2-CBC-SHA
- EXP-KRB5-DES-CBC-SHA
- KRB5-RC4-MD5
- KRB5-DES-CBC3-MD5
- KRB5-DES-CBC-MD5
- KRB5-RC4-SHA
- KRB5-DES-CBC3-SHA
- KRB5-DES-CBC-SHA
- ADH-DES-CBC3-SHA
- ADH-DES-CBC-SHA
- EXP-ADH-DES-CBC-SHA
- ADH-RC4-MD5
- EXP-ADH-RC4-MD5
- EDH-RSA-DES-CBC3-SHA
- EDH-RSA-DES-CBC-SHA
- EXP-EDH-RSA-DES-CBC-SHA
- EDH-DSS-DES-CBC3-SHA
- EDH-DSS-DES-CBC-SHA
- EXP-EDH-DSS-DES-CBC-SHA
+ DES-CBC3-SHA at Server public key is 2048 bit
- DES-CBC-SHA
- EXP-DES-CBC-SHA
- EXP-RC2-CBC-MD5
+ RC4-SHA at Server public key is 2048 bit
+ RC4-MD5 at Server public key is 2048 bit
- EXP-RC4-MD5
- DES-CBC3-MD5
- DES-CBC-MD5
- EXP-RC2-CBC-MD5
- RC2-CBC-MD5
- EXP-RC4-MD5
+ RC4-MD5 at Server public key is 2048 bit
- NULL-SHA
- NULL-MD5
It's basically the list you mentioned (except for the size of the public
keys).
So, it looks like none of the SSLCipherSuite directives inside virtual host
containers have any effect, only the global one has.
What I don't understand is that the other directives do have an effect. Fo=
r
instance, the block defined in the
XXX.XXX.XXX.XXX:443> container is definitely taken into account, as my SVN
repository is properly served by Apache (everything is working perfectly).
Similarly, at some point I added LimitRequestBody and LimitXMLRequestBody
directives to this virtual host container, and they had the intended effect=
..
Why would it be different for SSLCipherSuite?
Thanks for your help.
Cheers,
Franz
--002215b01c4a8bc81f047b925e81
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
On Thu, Dec 17, 2009 at 6:21 PM, Justin Pasher <<=
a href=3D"mailto:justinp@newmediagateway.com">justinp@newmedia gateway.com=
a>> wrote:
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex;">
Fran=E7ois Beaune wrote:
[snip]
=
=A0
r-left:1px #ccc solid;padding-left:1ex;">
style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
I'm still getting the same list, even if I use the SSLCipherSuite you s=
uggested, so it's clearly not used.
On my side (in my subdomain's configuration), I only have one SSLCipher=
Suite occurrence, inside the <VirtualHost> container I shown earlier =
in this thread (and it's not in a <Location> or <Directory>=
container).
That being said, in /etc/httpd/conf.d/ssl.conf, there is another occurrence=
:
=A0 =A0<VirtualHost _default_:443>
=A0 =A0 =A0 =A0...
=A0 =A0 =A0 =A0SSLEngine on
=A0 =A0 =A0 =A0SSLProtocol all -SSLv2
=A0 =A0 =A0 =A0SSLCipherSuite ALL:!ADH:!EXPORT:!SSLv2:RC4+RSA:+HIGH:+MEDIU=
M:+LOW
=A0 =A0 =A0 =A0...
=A0 =A0</VirtualHost>
Shouldn't my configuration file have precedence over that?
So now we know how Firefox is still using AES256. It's just a matter of=
figuring out why the SSLCipherSuite is not being used. The first thing I=
39;d try is replacing the SSLCipherSuite directory you found above (inside =
the <VirtualHost _default_:443> container). If that fixes the problem=
, then you at least know where it's picking up the setting. As far as W=
HY it's hitting that VirtualHost container, Apache should be falling ba=
ck to that one if there is no other matching <VirtualHost> container =
for the request. Looking back at the original post, I see this...
=3D"im">
<VirtualHost XXX.XXX.XXX.XXX:443>
=A0 =A0 =A0 ServerName
blank">svn.mydomain.net:443
....
</VirtualHost>
So I assume that the request is actually being made to the (masked) IP addr=
ess XXX.XXX.XXX.XXX? One thought out from left field would be that the box =
has multiple IP addresses assigned and the request is actually hitting YYY.=
YYY.YYY.YYY instead of XXX.XXX.XXX.XXX, which would make it fall back to th=
e default VirtualHost:443, I believe. Also, if you are trying to access the=
server via localhost, that would be coming from a different IP address (12=
7.0.0.1), so it would also fall back to the default. Additional note: you d=
on't need the ":443" on the ServerName.
Now, if changing the SSLCipherSuite in the default VirtualHost does NOT reg=
ister the change, then it would sound like it's not hitting ANY of the =
VirtualHost containers that have SSLCipherSuite defined. If that really is =
the case, you could always put the SSLCipherSuite in the global scope as a =
last resort, but ideally you could figure out why it's not recognizing =
the setting.
=
Getting back to this problem only now.
<=
div>I tried changing the SSLCipherSuite directive in=A0/etc/httpd/conf.d/ss=
l.conf (in the=A0<VirtualHost _default_:443> container), but that had=
no effect. =A0However, I also tried adding a global SSLCipherSuite directi=
ve outside any container, and that had the intended effect:
$ ./openssl_check.sh
n.net">svn.mydomain.net
Checking
in.net:443">svn.mydomain.net:443 ...
- DHE-DSS-RC4-SHA<=
/div>
- EXP1024-DHE-DSS-RC4-SHA
- EXP1024-RC4-SHA
>
- EXP1024-DHE-DSS-DES-CBC-SHA
- EXP1024-DES-CBC=
-SHA
- ADH-AES256-SHA
- DHE-RSA-AES256-SHA<=
/div>
- DHE-DSS-AES256-SHA
+ AES256-SHA at Server public key is 2048 bit
- =
ADH-AES128-SHA
- DHE-RSA-AES128-SHA
- DHE-D=
SS-AES128-SHA
+ AES128-SHA at Server public key is 2048 bit=
- EXP-KRB5-RC4-MD5
- EXP-KRB5-RC2-CBC-MD5
- EXP-KRB5-DES-CBC-MD5
iv>
- EXP-KRB5-RC4-SHA
- EXP-KRB5-RC2-CBC-SHA
v>
- EXP-KRB5-DES-CBC-SHA
- KRB5-RC4-MD5
v> - KRB5-DES-CBC3-MD5
- KRB5-DES-CBC-MD5
- KRB5-RC4-SHA
=A0=
=A0- KRB5-DES-CBC3-SHA
- KRB5-DES-CBC-SHA
-=
ADH-DES-CBC3-SHA
- ADH-DES-CBC-SHA
- EXP-A=
DH-DES-CBC-SHA
- ADH-RC4-MD5
- EXP-ADH-RC4-MD5
- EDH=
-RSA-DES-CBC3-SHA
- EDH-RSA-DES-CBC-SHA
- E=
XP-EDH-RSA-DES-CBC-SHA
- EDH-DSS-DES-CBC3-SHA
=A0=
=A0- EDH-DSS-DES-CBC-SHA
- EXP-EDH-DSS-DES-CBC-SHA
+ DES-CBC3-SHA at Serv=
er public key is 2048 bit
- DES-CBC-SHA
- E=
XP-DES-CBC-SHA
- EXP-RC2-CBC-MD5
+ RC4-SHA =
at Server public key is 2048 bit
+ RC4-MD5 at Server public key is 2048 bit
- EXP=
-RC4-MD5
- DES-CBC3-MD5
- DES-CBC-MD5
=
- EXP-RC2-CBC-MD5
- RC2-CBC-MD5
=
- EXP-RC4-MD5
+ RC4-MD5 at Server public key is 2048 bit
- NULL-SHA=
- NULL-MD5
It's basical=
ly the list you mentioned (except for=A0the size of the public keys).
=
So, it looks like none of the SSLCipherSuite directives inside virtual=
host containers have any effect, only the global one has.
=
div>
What I don't understand is that the other directives do have a=
n effect. =A0For instance, the <Location /> block defined in the=A0
pan class=3D"Apple-style-span" style=3D"font-family: arial, sans-serif; fon=
t-size: 13px; border-collapse: collapse; "><VirtualHost XXX.XXX.XXX.XXX:=
443> container
separate; font-family: arial; font-size: small; ">=A0is definitely taken i=
nto account, as my SVN repository is properly served by Apache (everything =
is working perfectly). =A0Similarly, at some point I added=A0LimitRequestBo=
dy and=A0LimitXMLRequestBody directives to this virtual host container, and=
they had the intended effect. =A0Why would it be different for SSLCipherSu=
ite?
if; font-size: 13px; border-collapse: collapse; ">
e-span" style=3D"border-collapse: separate; font-family: arial; font-size: =
small; ">
ily: arial, sans-serif; font-size: 13px; border-collapse: collapse; ">
class=3D"Apple-style-span" style=3D"border-collapse: separate; font-family=
: arial; font-size: small; ">Thanks for your help.
if; font-size: 13px; border-collapse: collapse; ">
e-span" style=3D"border-collapse: separate; font-family: arial; font-size: =
small; ">
ily: arial, sans-serif; font-size: 13px; border-collapse: collapse; ">
class=3D"Apple-style-span" style=3D"border-collapse: separate; font-family=
: arial; font-size: small; ">Cheers,
if; font-size: 13px; border-collapse: collapse; ">
e-span" style=3D"border-collapse: separate; font-family: arial; font-size: =
small; ">Franz
if; font-size: 13px; border-collapse: collapse; ">
e-span" style=3D"border-collapse: separate; font-family: arial; font-size: =
small; ">
--002215b01c4a8bc81f047b925e81--