Hi,

I assume that you are configuring client side conduit.
For the client I would suggest to follow CXF example for TLS client parameters:

            <sec:cipherSuitesFilter>
                <!-- these filters ensure that a ciphersuite with
                  export-suitable or null encryption is used,
                  but exclude anonymous Diffie-Hellman key change as
                  this is vulnerable to man-in-the-middle attacks -->
                <sec:include>.*_EXPORT_.*</sec:include>
                <sec:include>.*_EXPORT1024_.*</sec:include>
                <sec:include>.*_WITH_DES_.*</sec:include>
                <sec:include>.*_WITH_AES_.*</sec:include>
                <sec:include>.*_WITH_NULL_.*</sec:include>
                <sec:exclude>.*_DH_anon_.*</sec:exclude>
            </sec:cipherSuitesFilter>

It includes most popular ciphers and excludes vulnerable anonymous 
Diffie-Hellman one.
So your client will be flexible and safe.

Regards,
Andrei.

> -----Original Message-----
> From: James Y. Li [mailto:[email protected]]
> Sent: Freitag, 24. Juli 2015 06:14
> To: [email protected]
> Subject: cipherSuites Filtering
> 
> Hi All,
> I am trying to write a cipherSuitesFilter which excludes DH ciphers and 
> includes
> the following ciphers:
> 
> *AES256-SHA (*SSLv3 Kx=RSA      Au=RSA  Enc=AES(256)  Mac=SHA1*)*
> 
> *DES-CBC3-SHA (*SSLv3 Kx=RSA      Au=RSA  Enc=3DES(168) Mac=SHA1*)*
> 
> *AES128-SHA (*SSLv3 Kx=RSA      Au=RSA  Enc=AES(128)  Mac=SHA1*)*
> 
> And I referred to the example at
> http://cxf.apache.org/docs/client-http-transport-including-ssl-
> support.html#ClientHTTPTransport(includingSSLsupport)-ConfiguringSSLSupport
> 
> So should my filter look like this? Should I include more restrictions on 
> 'Au',
> 'Mac' as above?
> 
>      <sec:cipherSuitesFilter>
>         <sec:include>.*_WITH_AES_.*</sec:include>
>         <sec:include>.*_WITH_DES_.*</sec:include>
>         <sec:exclude>.*_DH_.*</sec:exclude>
>       </sec:cipherSuitesFilter>
> 
> Thanks!

Reply via email to