[RADIATOR] Use Mozilla's intermediate cipher suites set by default.
Nick Lowe
nick.lowe at lugatech.com
Tue Nov 18 10:06:56 CST 2014
Please may I suggest that you consider changing the default cipher
suites configuration in Radiator 4.14 for TLS to use Mozilla's
intermediate compatibility (default) set to encourage the use of
better cipher suites that use ECDHE, GCM and PFS?
See https://wiki.mozilla.org/Security/Server_Side_TLS
This is:
ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA
This is fully compatible all the way back to Windows XP where 3DES will be used.
It also brings Radiator in to compliance with the very likely upcoming:
https://datatracker.ietf.org/doc/draft-ietf-tls-prohibiting-rc4/
Cheers,
Nick
More information about the radiator
mailing list