-are-others-SHA256-cipher-suits-in-Firefox-27-tp306678p311535.html
Sent from the Mozilla - Cryptography mailing list archive at Nabble.com.
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
On 2014-03-23 11:43, gegard4321 wrote:
Another reason to enable DHE_RSA_AES_*_GCM: Mozilla's new account
system only
supports RSA and DHE_RSA ciphers:
https://www.ssllabs.com/ssltest/analyze.html?d=accounts.firefox.com
Same goes for mozilla.org and bugzilla.
On the server side, we are working
On Sun, Mar 23, 2014 at 08:43:35AM -0700, gegard4321 wrote:
Another reason to enable DHE_RSA_AES_*_GCM: Mozilla's new account system only
supports RSA and DHE_RSA ciphers:
https://www.ssllabs.com/ssltest/analyze.html?d=accounts.firefox.com
Same goes for mozilla.org and bugzilla.
Firefox
.nabble.com/Where-are-others-SHA256-cipher-suits-in-Firefox-27-tp306678p311571.html
Sent from the Mozilla - Cryptography mailing list archive at Nabble.com.
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
don't really have alternatives.
But we have to go with what we currently know.
Hopefully alternatives will emerge in the near future.
--
View this message in context:
http://mozilla.6506.n7.nabble.com/Where-are-others-SHA256-cipher-suits-in-Firefox-27-tp306678p306864.html
Sent from the Mozilla
Regarding the other variants of AES-GCM
-TLS_RSA_WITH_AES_128_GCM_SHA256
There are some sites support AES-GCM that use only ciphers with RSA key
exchange. I think it would be best not to support new standards that don't
provide Forward Secrecy, but on the other hand, if this cipher is enabled
On Wed, Feb 5, 2014 at 9:54 PM, Rasj rasj...@gmail.com wrote:
Where are others? For example:
TLS_RSA_WITH_AES_256_CBC_SHA256 (0x3d)
See https://briansmith.org/browser-ciphersuites-01.html. Also, please
look at the archives of this mailing list. There have been several
DOZEN of emails about the
On Thursday, February 6, 2014 12:50:16 PM UTC+4, Brian Smith wrote:
Many web-sites have only TLS_RSA_WITH_AES_256_CBC_SHA256 as kind of
strong(even without PFS) and weak RC4 and 3DES.
Please provide some examples of such sites.
Some Banks.
You can include it by default but turn it off if
Regarding the other variants of AES-GCM
-TLS_RSA_WITH_AES_128_GCM_SHA256
There are some sites support AES-GCM that use only ciphers with RSA key
exchange. I think it would be best not to support new standards that
don't provide Forward Secrecy, but on the other hand, if this cipher is
enabled
On Thu, Feb 06, 2014 at 09:57:34PM +, gegard4321-bugzi...@yahoo.co.uk wrote:
Regarding the other variants of AES-GCM
-TLS_RSA_WITH_AES_128_GCM_SHA256
There are some sites support AES-GCM that use only ciphers with RSA key
exchange. I think it would be best not to support new standards
Hi,
I see only:
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b)
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f)
Where are others? For example:
TLS_RSA_WITH_AES_256_CBC_SHA256 (0x3d)
Many web-sites have only TLS_RSA_WITH_AES_256_CBC_SHA256 as kind of strong(even
without PFS) and weak RC4 and
11 matches
Mail list logo