<div dir="ltr"><div><div>Hi Hanno, hi Aaron, Hi Pepi<span><font color="#888888">,<br><br></font></span></div>thank you very for your answers.<span><font color="#888888"><br></font></span></div>Yes performance issues may be a reason to not to set up the aimed configuration.<span><font color="#888888"><br>
</font></span><div><div><div class="gmail_extra"><div class="gmail_quote"><br><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
This is in theory a good idea, but ONLY if you use a reasonable large<br>
DHE exchange. Most people use 1024 bit.<br></blockquote><div>Yes, according to BSI TR 02102 this should be 2000 bit, or if applicable 3000 bit from 2015 on.<br><br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">

Always prefer GCM over CBC, no matter what AES size. CBC has issues,<br>
AES128 has not.<br>
Your config will e.g. cause firefox to connect with CBC.<br>
<span class=""><font color="#888888"><br></font></span></blockquote><div></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><span class=""><font color="#888888">
Hanno Böck<br></font></span><br></blockquote><div><br></div><div>I switched it to this way:</div><div></div></div><div style="margin-left:40px">TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x9f)<br></div><div style="margin-left:40px">
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x9e)<br><br>TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (0x6b)<br>
TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x39)<br>
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (0x67)<br>TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x33)<br><br>TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030)<br>TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c)<br>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f)<br>


TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b)<br><br>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028)<br>TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (0xc024)<br>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)<br>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027)<br>


TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (0xc023)<br>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)<br></div><div style="margin-left:40px">...<br></div></div><div style="margin-left:40px" class="gmail_extra">RSA.... if necessary<br>
</div><div class="gmail_extra"><br><div class="gmail_extra">Could this develop to a suggestion for 'CipherStringB', too? <br></div><br></div><div class="gmail_extra">According to what I found in sslsabs 'Java 8b132' is the only 'Client' that supports 0x9e, besides OpenSSL1.0.1e that supports also 0x9f. Any further good news on this?<br>
</div><br><div class="gmail_extra">Kind regards<br></div><div class="gmail_extra">Torsten<br></div><div class="gmail_extra"><br></div></div></div></div>