+1

load-test also fine, with and without Keep-Alive

Am 11.03.2014 23:49, schrieb Reindl Harald:
> looks so far good, DHE ciphers sadly still not supported
> but ECDHE now without patches, too few for a vote but
> for now it looks fine, will give it a load-test tomorrow
> 
> (was a hard day with security audits, httpd-2.4.8 testing...)
> 
> [harry@srv-rhsoft:~]$ sslscan localhost:8443 | grep Accepted
>     Accepted  TLSv1  256 bits  ECDHE-RSA-AES256-SHA
>     Accepted  TLSv1  256 bits  AES256-SHA
>     Accepted  TLSv1  256 bits  CAMELLIA256-SHA
>     Accepted  TLSv1  168 bits  ECDHE-RSA-DES-CBC3-SHA
>     Accepted  TLSv1  168 bits  DES-CBC3-SHA
>     Accepted  TLSv1  128 bits  ECDHE-RSA-AES128-SHA
>     Accepted  TLSv1  128 bits  AES128-SHA
>     Accepted  TLSv1  128 bits  CAMELLIA128-SHA
>     Accepted  TLS11  256 bits  ECDHE-RSA-AES256-SHA
>     Accepted  TLS11  256 bits  AES256-SHA
>     Accepted  TLS11  256 bits  CAMELLIA256-SHA
>     Accepted  TLS11  168 bits  ECDHE-RSA-DES-CBC3-SHA
>     Accepted  TLS11  168 bits  DES-CBC3-SHA
>     Accepted  TLS11  128 bits  ECDHE-RSA-AES128-SHA
>     Accepted  TLS11  128 bits  AES128-SHA
>     Accepted  TLS11  128 bits  CAMELLIA128-SHA
>     Accepted  TLS12  256 bits  ECDHE-RSA-AES256-GCM-SHA384
>     Accepted  TLS12  256 bits  ECDHE-RSA-AES256-SHA384
>     Accepted  TLS12  256 bits  ECDHE-RSA-AES256-SHA
>     Accepted  TLS12  256 bits  AES256-GCM-SHA384
>     Accepted  TLS12  256 bits  AES256-SHA
>     Accepted  TLS12  256 bits  CAMELLIA256-SHA
>     Accepted  TLS12  168 bits  ECDHE-RSA-DES-CBC3-SHA
>     Accepted  TLS12  168 bits  DES-CBC3-SHA
>     Accepted  TLS12  128 bits  ECDHE-RSA-AES128-GCM-SHA256
>     Accepted  TLS12  128 bits  ECDHE-RSA-AES128-SHA256
>     Accepted  TLS12  128 bits  ECDHE-RSA-AES128-SHA
>     Accepted  TLS12  128 bits  AES128-GCM-SHA256
>     Accepted  TLS12  128 bits  AES128-SHA
>     Accepted  TLS12  128 bits  CAMELLIA128-SHA
> 
> Am 08.03.2014 02:51, schrieb Phil Sorber:
>> Hello All,
>>
>> It's been a while since RC0, and we've tracked down quite a few bugs. So 
>> I've prepared a new release for v4.2.0
>> (RC1) which is the last stable release in the 4.x series. This will serve as 
>> our Long Term Support (LTS) version as
>> detailed in our Release Management document

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to