On Fri, Jul 25, 2008 at 05:10:54PM +0200, Soverini Luca wrote:

>  A vulnerability? assesment find a weak cipher list.
> Is possible to disable  weak cipher list by command tool openssl?

The cipherlist needs to be adjusted in the relevant applications, not
the openssl(1) command-line tool. The "DEFAULT" cipherlist is compiled
into the library, each application can select a non-default list if
it so chooses.

Don't put blind faith in vulnerability assessments. In many cases a weak
cipher is better than no SSL at all. Is this an application where TLS
is with strong authentication, and protects sensitive data? Is reducing
interoperatbility by trimming the cipher-list justified by the potential
security gains?

Before you consider dropping weak ciphers, it is best to consider drop
SSLv2 support, and using just SSLv3/TLSv1. Only then consider shrinking
the cipher list.

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to