Well, TLSv1.2 is nowdays supported very well:

https://en.wikipedia.org/wiki/Template:TLS/SSL_support_history_of_web_browsers

It even works on IE.

--
Eero

2016-12-22 13:36 GMT+02:00 Reindl Harald <[email protected]>:

>
>
> Am 21.12.2016 um 18:45 schrieb Eero Volotinen:
>
>> Is there any reason to support other than TLSv1.2 protocols?
>>
>
> in your small world probably not
>
> in the real world where you ar enot in the position to update every
> mailclient of every customer or even every operating system and it's
> browsers of website visitors it is
>
> there is no reason that a recent client would fall back to 3DES other than
> a major bug in that client which needs to be fixed there and not on the
> server side
>
> 2016-12-20 18:09 GMT+02:00 Madden, Joe <[email protected]
>> <mailto:[email protected]>>:
>>
>>     Hi,____
>>
>>     __ __
>>
>>     Our openvas is showing the following ciphers as a medimum risk:____
>>
>>     __ __
>>
>>       TLS1_0_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA____
>>
>>       TLS1_0_DHE_RSA_WITH_3DES_EDE_CBC_SHA____
>>
>>       TLS1_0_RSA_WITH_3DES_EDE_CBC_SHA____
>>
>>       TLS1_1_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA____
>>
>>       TLS1_1_DHE_RSA_WITH_3DES_EDE_CBC_SHA____
>>
>>       TLS1_1_RSA_WITH_3DES_EDE_CBC_SHA____
>>
>>       TLS1_2_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA____
>>
>>       TLS1_2_DHE_RSA_WITH_3DES_EDE_CBC_SHA____
>>
>>       TLS1_2_RSA_WITH_3DES_EDE_CBC_SHA____
>>
> _______________________________________________
> Openvas-discuss mailing list
> [email protected]
> https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
>
_______________________________________________
Openvas-discuss mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to