-
Notifications
You must be signed in to change notification settings - Fork 133
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Invalid cipher #94
Comments
If you're using Openssl 1.1.0g you need this patch: https://gitlab.com/buik/openssl/blob/openssl-patch/openssl-1.1/OpenSSL1.1g-equal-preference-cipher-groups.patch |
Hi @franzhaenel, You should use OpenSSL 1.1.1 pre5: and besides you should also skip TLS 1.0 and TLS 1.1: ssl_protocols TLSv1.2 TLSv1.3;(DRAFT) NIST Special Publication 800-52, Revision 2 https://csrc.nist.gov/CSRC/media/Publications/sp/800-52/rev-2/draft/documents/sp800-52r2-draft.pdf That's the NIST recommendation for secure (government) sites. However, in the age of phishing, cyber attacks, ransomware,.... etc. you should keep your website as safe as possible. TLS 1.2 is good enough to cover legacies and TLS 1.3 is the way to go. With both you have both: backwards compatible & future-proof. :-) I hope this helps... :-) |
I would recommend against migrating to OpenSSL 1.1.1, as it is currently an alpha-quality build for testing purposes only. It should not be used for security critical purposes. Furthermore, TLS 1.2 is probably insufficient for legacy client support. The NIST guidelines are not applicable to all use cases, and you should always analyze your user base before deciding which protocols to support or drop. @McKinleyGroup TLS protocol support also has nothing to do with phishing or ransomware, and a properly configured server, which should prefer stronger cipher suites and protocols over weaker ones, will have zero problems leaving TLS 1.0 and 1.1 enabled. They would only be used by legacy clients that do not support the modern protocols. |
Justin Su: It's good enough for: So, I don't see the point. TLS 1.2 is only a TEMPORARY legacy support... TLS 1.0 has been hacked in 2011... An open-door policy is important to you? :-) Red alert: HTTPS has been hacked https://www.infoworld.com/article/2620383/security/red-alert--https-has-been-hacked.html Yahoo had 3 billion email accounts hacked and learned nothing from it: TLS 1.3 is No ---- a correct NIST-compliant configuration would be: TLS 1.3 is Yes
|
There are numerous web-facing servers run by three-letter agencies that still support TLS 1.0 and 1.1. Take https://nsa.gov for instance.
Not coincidentally, nsa.gov is also on Akamai, which, you guessed it, also supports < TLS 1.2.
Not sure what your point is here, Cloudflare themselves support < TLS 1.2 everywhere. Hell, they even support SHA1 certificates for legacy legacy clients.
Yeah. Right.
Because I, as well as most people in the industry, feel that legacy client support is, in a lot of cases, important. A significant portion of devices still do not support TLS 1.2 and AEAD cipher suites.
Give me one scenario, any practical scenario, where supporting TLS 1.1 would add additional risk to phishing or ransomware. I'll wait.
What does that have to do with TLS? Security in general is important, but headers are not relevant to this discussion.
Modern clients with proper TLS 1.2 implementations will only ever use TLS 1.2, even if the server supports legacy protocols. Sure, the protocols are weak, they're better than plain HTTP. Only clients that do not support TLS 1.2 would fall back to the legacy protocols and cipher suites, that is the entire point. If you feel comfortable dropping TLS 1.0 and 1.1 support, and forcing all of your legacy clients to HTTP instead, then go for it. This is getting off topic, and further discussion would be best continued off this thread. |
I used this cipher from the repo and it didn't work out.
and
The text was updated successfully, but these errors were encountered: