Thanks for the response, Bob.
I know a fair amount about this kind of thing. Feel free to contact me you'd like any more information or suggestions on a good ephemeral Diffie-Hellman parameters and/or ways of mitigating the TLS handshake performance costs. Regards, Brian From: twitter-development-talk@googlegroups.com [mailto:twitter-development-t...@googlegroups.com] On Behalf Of Bob Lord Sent: Monday, May 24, 2010 7:43 PM To: twitter-development-talk@googlegroups.com Subject: Re: [twitter-dev] DHE ciphersuites disabled? We're talking about this internally. I'm cautiously optimistic. /B On Mon, May 24, 2010 at 12:43 AM, Brian Smith <br...@briansmith.org> wrote: I noticed about a week ago that my application stopped working. Now I have tested it and it appears that api.twitter.com is now blocking DHE cipher suites such as TLS_DHE_RSA_WITH_AES_128_CBC_SHA, whereas previously these DHE cipher suites were working perfectly. The DHE cipher suites have a distinct security advantage over the non-DHE cipher suites like TLS_RSA_WITH_AES_128_CBC_SHA: in the event that Twitter's RSA private key is compromised (via hacking, a warrant, a court order, or other means), all the previous traffic encrypted with the non-DHE cipher suites can be decrypted, but the previous traffic encrypted with DHE cipher suites cannot be decrypted after the fact. My questions: 1. Is there any chance the DHE cipher suites can be re-enabled? 2. Can you provide any guarantees about which cipher suites will always be available? openssl s_client -host api.twitter.com -port 443 -tls1 -cipher DHE-RSA- AES128-SHA openssl s_client -host api.twitter.com -port 443 -tls1 -cipher DHE-RSA- AES256-SHA openssl s_client -host api.twitter.com -port 443 -tls1 -cipher AES128-SHA openssl s_client -host api.twitter.com -port 443 -tls1 -cipher AES256-SHA Thanks, Brian