Hello,

Using NSS 3.19.1-18 & JSS 4.2.6-37 on RHEL7.
When using Mozilla JSS to create a client socket to a TLS server, I've
configured the socket to only use TLS_RSA_WITH_AES_256_CBC_SHA and
TLS_RSA_WITH_AES_128_CBC_SHA.
If I TCP dump the TLS Handshakes in the connection and inspect the cipher
suites presented in the TLS Client Hello, I see that my TLS client is
unconditionally asserting TLS_ECDHE_WITH_AES_256_GCM_SHA384 along with
various flavors of TLS_RSA_WITH_AES_256_X_SHA and
TLS_RSA_WITH_AES_128_X_SHA. Where is the TLS_ECDHE_WITH_AES_256_GCM_SHA384
coming from?

Has anyone seen this behavior before?

Thanks
GW
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to