[Ach] SSL for limited user groups

Robert M. Albrecht lists at romal.org
Thu Jan 1 20:43:49 CET 2015


with only AESGCM OSX Safari does not work.

I had to enable one more cipher


Is there a better choice ?

OSX Safari supports

TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (0xc024)   Forward Secrecy	256
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (0xc023)   Forward Secrecy	128
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a)   Forward Secrecy	256
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)   Forward Secrecy	128
TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (0xc008)   Forward Secrecy	112
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028)   Forward Secrecy	256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027)   Forward Secrecy	128
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)   Forward Secrecy	256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)   Forward Secrecy	128
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (0xc012)   Forward Secrecy	112
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 (0xc026)	256
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 (0xc025)	128


Any idea why Qualys downgrades AES128 Bit ?

cu romal

Am 01.01.15 um 17:56 schrieb Hanno Böck:
> On Thu, 01 Jan 2015 17:44:32 +0100
> "Robert M. Albrecht" <lists at romal.org> wrote:
>> exactly my point, easy to make errors for non-crypto-experts:
>> is more reasonable ?
> This will disable all aes128-ciphers. There is hardly a reason to
> believe aes256 is more secure than aes128. And mainstream browsers
> (chrome+firefox) don't support aes256+gcm.
> I had to play a bit to get a string that will give you the gcm-fs-only,
> but this one should do:
> (and yes, it's really a pity how complicated this cipher string business
> is...)
> Of course you should also make sure some other things are in good
> shape, e.g. enable hsts, hpkp, ocsp stapling and make sure if you want
> to use DH exchanges that they're >=2048 bit.
> cu,
> _______________________________________________
> Ach mailing list
> Ach at lists.cert.at
> http://lists.cert.at/cgi-bin/mailman/listinfo/ach

More information about the Ach mailing list