https://github.com/openssl/openssl/pull/783
Courtesy of David Benjamin. On Thu, Mar 3, 2016 at 4:34 PM Blumenthal, Uri - 0553 - MITLL < u...@ll.mit.edu> wrote: > +1 > > Sent from my BlackBerry 10 smartphone on the > Verizon Wireless 4G LTE network. > Original Message > From: Hanno Böck > Sent: Thursday, March 3, 2016 07:28 > To: openssl-dev@openssl.org > Reply To: openssl-dev@openssl.org > Subject: [openssl-dev] cipher order > > Hi, > > Last year I proposed to change the ciphering order in OpenSSL to always > prefer AEAD cipher suites before CBC/HMAC-based ones: > https://mta.openssl.org/pipermail/openssl-dev/2015-January/000421.html > > I just checked openssl 1.1.0 alpha and it still orders ciphers in an > imho problematic way. > > Browsers have largely decided to implement GCM-modes only with AES128. > Chrome is now about to change that. Not sure if other browsers will > follow. > > Right now if you configure a server with openssl's cipher suite > ordering it is likely that a connection will happen with AES256 in CBC > mode instead of the (most likely more secure) AES128 in GCM mode. > > Can this be changed before 1.1.0 gets out? > > -- > Hanno Böck > https://hboeck.de/ > > mail/jabber: ha...@hboeck.de > GPG: BBB51E42 > > -- > openssl-dev mailing list > To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev >
-- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev