Hello,

While trying to make sense of the appalling connection success rate in 
v9.2.3.0, I have looked at the TLS session and observed the following:

1. After receiving ACK, TB! starts ClientHello advertising support of 26
   different cipher suits. Some of them look questionably at best and
   concerning at worst.

3. In particular TLS_RSA_WITH_RC4_128_MD5 is prohibited by IETF (see the RFC
   7465) and 3DES_EDE_CBC_SHA has rather limited use in 2020.

I am not quite sure if this affects failing sessions, but perhaps RitLabs can
restrict the list to something more up-to-date?

For example:

1. ECDHE-RSA-AES128-GCM-SHA256
2. ECDHE-ECDSA-AES256-GCM-SHA384
3. ECDHE-RSA-AES256-GCM-SHA384
4. ECDHE-ECDSA-CHACHA20-POLY1305
5. ECDHE-RSA-CHACHA20-POLY1305
6. DHE-RSA-AES128-GCM-SHA256
7. DHE-RSA-AES256-GCM-SHA384

Additionally, I would check if TB! has TLS 1.0/1.1 disabled. v1.2 has turned
12 years old last month :)


-- 
v9.2.3.0 x64 on Windows 10 18363


________________________________________________
Current version is 9.1.18 | 'Using TBUDL' information:
http://www.silverstones.com/thebat/TBUDLInfo.html

Reply via email to