Here is a link to a screen grab of SSL Configuration Checker by GlobalSign for my domain: SSL Configuration Checker: http://i.imgur.com/CbVjVee.png.
Following recent discussions with the host, they concluded:
To achieve "A" rating,we will need to enable "Forward Secrecy" and for that we need Apache 2.4.X. The current Apache web server installed on the dedicated server is : Server version: Apache/2.2.24 (Unix).
The certificate is free with the hosting.
But, it occurred to me that this free status might be irrelevant if it's Server Configurations that determines if TLS tests pass with an 'A'.
Question:
Is it the Server that primarily determines optimum TLS configuration as far as ssllabs.com SSL Checkers and such like are concerned?
If so, then:
Is it right to conclude that no matter what grade of TLS one purchases (e.g. Basic SSL through to expensive EV SSL Certificates) if the Server is not configured so according to recognizable standards such as disabling SSL 3.0, and enabling TLS 1.2 (Apache version permitting), the TLS will never reach A, A-, OR A+ when tested?
Considering the impact that Apache version has on 'Forward Secrecy', would this issue still be true even with an EV SSL Certificate?
UPDATE:
Link: SSL/TLS Deployment Best Practices
Steps taken to resolve (achieve acceptable Grade):
With the TLS v1.2 protocol, updated OpenSSL and recompiled Apache: Apache/2.2.29 mod_ssl/2.2.29 OpenSSL/1.0.1e-fips mod_bwlimited/1.4 mod_fcgid/2.3.9
After that, adjusted the ciphers anew.
Patched the server for the Poodle vulnerability by disabling the SSL v3 protocol.