[openssl-dev] cipher order
Blumenthal, Uri - 0553 - MITLL
uri at ll.mit.edu
Thu Mar 3 15:33:51 UTC 2016
+1
Sent from my BlackBerry 10 smartphone on the Verizon Wireless 4G LTE network.
Original Message
From: Hanno Böck
Sent: Thursday, March 3, 2016 07:28
To: openssl-dev at openssl.org
Reply To: openssl-dev at openssl.org
Subject: [openssl-dev] cipher order
Hi,
Last year I proposed to change the ciphering order in OpenSSL to always
prefer AEAD cipher suites before CBC/HMAC-based ones:
https://mta.openssl.org/pipermail/openssl-dev/2015-January/000421.html
I just checked openssl 1.1.0 alpha and it still orders ciphers in an
imho problematic way.
Browsers have largely decided to implement GCM-modes only with AES128.
Chrome is now about to change that. Not sure if other browsers will
follow.
Right now if you configure a server with openssl's cipher suite
ordering it is likely that a connection will happen with AES256 in CBC
mode instead of the (most likely more secure) AES128 in GCM mode.
Can this be changed before 1.1.0 gets out?
--
Hanno Böck
https://hboeck.de/
mail/jabber: hanno at hboeck.de
GPG: BBB51E42
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 4350 bytes
Desc: not available
URL: <http://mta.openssl.org/pipermail/openssl-dev/attachments/20160303/02c6adad/attachment.bin>
More information about the openssl-dev
mailing list