Hello,

On Mon, 4 Feb 2019 at 20:48, Bertrand Jacquin <bertr...@jacquin.bzh> wrote:
>
> Since TLS ciphers are not well understand, it is very common parameters
> from documentation are used as is. Since RC4 should not be used anymore
> I believe it is wiser to show example including stronger ciphers to
> avoid deploying unsafe configuration in the wild.
>
> "ALL" is also to avoid since it contains a lot of deprecated,
> insecure ciphers, and garbage that are not applicable in haproxy
> context.

Frankly I would rather remove those altogether and maybe link to
somewhere else, like the Mozilla TLS recommendations:
https://wiki.mozilla.org/Security/Server_Side_TLS

No one checks for documentation updates in stable releases, unless
it's for a new feature, so I'd be inclined to say backporting doc
fixes regarding security relevant stuff does not really work.


OpenSSL does not ship recommendations (they just change their
defaults), so we should probably not do that either.


just my two cents ...
lukas

Reply via email to