Well, TLSv1.2 is nowdays supported very well: https://en.wikipedia.org/wiki/Template:TLS/SSL_support_history_of_web_browsers
It even works on IE. -- Eero 2016-12-22 13:36 GMT+02:00 Reindl Harald <[email protected]>: > > > Am 21.12.2016 um 18:45 schrieb Eero Volotinen: > >> Is there any reason to support other than TLSv1.2 protocols? >> > > in your small world probably not > > in the real world where you ar enot in the position to update every > mailclient of every customer or even every operating system and it's > browsers of website visitors it is > > there is no reason that a recent client would fall back to 3DES other than > a major bug in that client which needs to be fixed there and not on the > server side > > 2016-12-20 18:09 GMT+02:00 Madden, Joe <[email protected] >> <mailto:[email protected]>>: >> >> Hi,____ >> >> __ __ >> >> Our openvas is showing the following ciphers as a medimum risk:____ >> >> __ __ >> >> TLS1_0_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA____ >> >> TLS1_0_DHE_RSA_WITH_3DES_EDE_CBC_SHA____ >> >> TLS1_0_RSA_WITH_3DES_EDE_CBC_SHA____ >> >> TLS1_1_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA____ >> >> TLS1_1_DHE_RSA_WITH_3DES_EDE_CBC_SHA____ >> >> TLS1_1_RSA_WITH_3DES_EDE_CBC_SHA____ >> >> TLS1_2_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA____ >> >> TLS1_2_DHE_RSA_WITH_3DES_EDE_CBC_SHA____ >> >> TLS1_2_RSA_WITH_3DES_EDE_CBC_SHA____ >> > _______________________________________________ > Openvas-discuss mailing list > [email protected] > https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss >
_______________________________________________ Openvas-discuss mailing list [email protected] https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
