Hi Bernd,
On 8/19/21 6:43 AM, Bernd wrote:
Hello,
while researching some TLS hardening (of JAva Implementations) I was
wondering the following:
- not requiring the preferred server cipher order has advantages,
because it is easier to configure, is the OpenJDK default, allows
clients some freedom to chose performance over strength and it also
reduces the UI needed for actual specifying the order.
Actually, as of JDK 13, the server side suite order is preferred [1].
Given the assumption that all enabled ciphers are security acceptable
this should also not be a big deal.
However for some compatibility reasons I have some installations where
AES_CBC and 1024Bit DHE is still used. I wonder if it would make sense
to add those two cipher families to the "legacyAlgorithms" security
policy, so that they are not touched, unless absolutely necesary to make
the connection.
By default the CBC suites are already ordered lower in priority than
other suites, so adding them to the legacy property probably would not
have any benefit.
I don't think it is possible to order DHE such that it is lower in
priority based on the key size. I will look into this more. However, by
default ECDHE with GCM suites are preferred over DHE.
Also, see [1] for more information. These cipher suite reorderings were
integrated into JDK 13, and have or are in the process of being
backported to earlier JDK releases.
Did somebody here considered that and has some experiences with it. Can
I add AES_CBC and DHE as partial matches?
One reason why I hesitate is this: if an medium-old client which only
knows CBC connects it would then require to negotiate a cipher from the
legacy block, which opens it up for the other entries in there as well
(like DES).
Suites that use DES are disabled by default, so I'm not sure I
understand this concern.
Granted, the other legacy ciphers are all not enabled by
default, but what if somebody had to enable EDE and was relying on it
beeing only negotiated for even-older (with no AES) clients. In that
situation a AES client suddenly could propose EDE as well...
Well, that's a risk that one has to take into account before re-enabling
these weaker suites.
Also: would be nice if the legacycipher could include DHE1024 but not
DHE2048,. This way the line does not need to be changed if minsize 2048
is set and/or if size agreement is in place.
It's an interesting suggestion but we will need to look into it further
to see if that type of configuration is possible.
--Sean
[1] https://bugs.openjdk.java.net/browse/JDK-8168261
[2] https://bugs.openjdk.java.net/browse/JDK-8163326