Was my server vulnerable to heartbleed if TLS has been disabled in the past?
In apaches vhost configuration the parameter sslCipherSuite contains only SSLv2 afaik this doesn't contain TLS.
Was my server vulnerable to heartbleed if TLS has been disabled in the past?
In apaches vhost configuration the parameter sslCipherSuite contains only SSLv2 afaik this doesn't contain TLS.
Nopes, you are not vulnerable to heartbleed BUT as Micahel Hampton so clearly and lucidly has pointed out that in this case heartbleed is the least of your concerns. I am assuming that your site does not use really concern itself with security else SSLv2 would have been ditched years ago. A suggestion to enable the site to be made more secure is to test with SSLLabs (Qualys) and fix the issues so discovered. https://www.ssllabs.com/ssltest/ Also if the apache configuration has "SSv2" then it might also be possible that your system admin might not have patched the server with security updates. This is a jump but to me it does not see far fetched since there is "SSLv2" in the apache configuration - it might be two different set of engineers responsible for but it is better to recheck and confirm. Also, TLS builds upon SSL, there are lots of texts that provide details on that. The wiki page on "TLS" is a good start. Also, with sslv2 being enabled, it would also be a safe bet to rekey the certificate as well. Not sure if the vulnerabilities associated with weaker cipher suites - a hallmark of SSLv2 - might have compromised the key material. Revoke and replace the certificate would be a good idea.