On Tue, 22 Mar 2022 19:34:17 GMT, Xue-Lei Andrew Fan <xue...@openjdk.org> wrote:

>> I see. That makes sense. However, I will note that the current order does 
>> not reflect the preference rules defined in lines 336-348 (copied below):
>> 
>> 
>>     // Definition of the CipherSuites that are supported but not enabled
>>     // by default.
>>     // They are listed in preference order, preferred first, using the
>>     // following criteria:
>>     // 1. If a cipher suite has been obsoleted, we put it at the end of
>>     //    the list.
>>     // 2. Prefer the stronger bulk cipher, in the order of AES_256,
>>     //    AES_128, 3DES-EDE, RC-4, DES, DES40, RC4_40, NULL.
>>     // 3. Prefer the stronger MAC algorithm, in the order of SHA384,
>>     //    SHA256, SHA, MD5.
>>     // 4. Prefer the better performance of key exchange and digital
>>     //    signature algorithm, in the order of ECDHE-ECDSA, ECDHE-RSA,
>>     //    RSA, ECDH-ECDSA, ECDH-RSA, DHE-RSA, DHE-DSS, anonymous.
>> 
>> In particular, some of the RC4 suites support forward secrecy but are 
>> ordered after the anon suites. The rules above say nothing about anon 
>> suites. They seem to be ordered as higher priority than others mainly 
>> because they use stronger ciphers. But 3DES and RC4 are obsolete suites, so 
>> maybe it is correct that they should be where they are.
>> 
>> Thus, it isn't clear to me if the current order does or does not accurately 
>> reflect these rules. I put the 3DES suites where they were because to me 
>> they are probably/maybe stronger than the RC4 suites, but do not use strong 
>> ciphers that the anon suites do, and are obsolete. So we either need to 
>> clarify the rules and put anon suites lower, and change the obsolete rule. 
>> Otherwise, I'm reluctant to make a change that seems inconsistent with the 
>> rules.
>> 
>> Having said all that, I also don't want to over-rotate on this and try to 
>> decide what suite is more weaker than others, since you really shouldn't be 
>> using any of them.
>
>> So we either need to clarify the rules and put anon suites lower, and change 
>> the obsolete rule.
> 
> It makes sense to me.  It might be better to update the rules firstly (or 
> just leave it alone as the priority is pretty low), but which is out of the 
> scope of this update.  I will approve this update.

Ok, let me think about whether this is worth improving as a separate issue. I 
did make one change to the order however, and that is to move the 
TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA and SSL_DH_anon_WITH_3DES_EDE_CBC_SHA 
suites lower in priority after other 3DES suites as these clearly should be 
lower in priority because they are using 3DES and anonymous authn.

-------------

PR: https://git.openjdk.java.net/jdk/pull/7894

Reply via email to