Hello,

> Hi Lukas,
> 
> The response is in our link:
> [2] https://github.com/openssl/openssl/issues/541
> 
> No need to disable this option per default and option is needed for security.

The point is: when the admin is aware of TLS security, he can easily add
a new config option on a major software upgrade, and we can even add this for
example to the mozilla TLS config generator as well. But, if this is just a
copy&paste from a 3 year old blog post, SSL_OP_CIPHER_SERVER_PREFERENCE
actively harms security, as a browser will have a more uptodate cipher
preference list then the server, but server preference will ignore it.

The old RC4 preference instead of AES-CBC, for example:
https://github.com/libressl-portable/portable/issues/66#issuecomment-183822438



> The equal-preference groups work with server preference. I tested it with
> BoringSSL.

I care primarily about vanilla OpenSSL, and in don't get a sense that there is 
an
interest to implement this for TLSv1.2.

What I want for haproxy is to be flexible enough to adress all cases, as is 
Apache
and nginx.



Thanks,
Lukas

Reply via email to