> > cipher AES-256-CBC
> > auth SHA256
>
> AES-256-GCM is what you want, because it's less overhead than -CBC+SHA
> (AEAD, crypt-and-hash in one go)
tls-version-min 1.2
tls-cipher TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
ncp-cipher AES-256-GCM:AES-256-CBC
authSHA256
dh
Hi,
On Wed, Mar 18, 2020 at 01:31:41PM +0100, Ralf Hildebrandt wrote:
> What are the current "state of the art" settings for cipher & auth?
> My current gateway is using:
>
> cipher AES-256-CBC
> auth SHA256
AES-256-GCM is what you want, because it's less overhead than -CBC+SHA
(AEAD,
What are the current "state of the art" settings for cipher & auth?
My current gateway is using:
cipher AES-256-CBC
auth SHA256
Ralf Hildebrandt
Charité - Universitätsmedizin Berlin
Geschäftsbereich IT | Abteilung Netzwerk
Campus Benjamin Franklin (CBF)
Haus I | 1. OG | Raum 105
Hindenburgdamm