On 08/11/2015 00:04, Matt Caswell wrote:
On 07/11/15 02:54, Viktor Dukhovni wrote:
On Fri, Nov 06, 2015 at 11:58:44PM +0000, Matt Caswell wrote:
OpenSSL selects the version it is going to use regardless of the
available ciphersuites. Only after selecting its version will the server
select the ciphersuite to use. If there aren't any compatible with the
selected version then it will fail with a "no shared cipher" error.
Will we always do that.  I am not confident we can promise this,
but this is not at present about to change.

I think it is very unlikely to change for the currently available
released versions - and it is the behaviour of those versions that I am
describing. It could possibly change for future versions (as could
anything) - although I'm not aware of any plans to do so.
I have seen rumors (nothing reliable) that the TLS WG is proposing
to disable a whole lot of good cipher suites in TLS 1.3.  If this
happens in the final spec, then some lists of enabled ciphers would
make TLS 1.2 the most secure choice even though TLS 1.3 is the
highest shared version.

More specifically, they seem to deprecate the suites that use
separate MAC and CRYPT keys in favor of AEAD suites that are
designed very close to the margins of being secure.

Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded

_______________________________________________
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to