[RADIATOR] Use Mozilla's intermediate cipher suites set by default.
    Nick Lowe 
    nick.lowe at lugatech.com
       
    Tue Nov 18 10:06:56 CST 2014
    
    
  
Please may I suggest that you consider changing the default cipher
suites configuration in Radiator 4.14 for TLS to use Mozilla's
intermediate compatibility (default) set to encourage the use of
better cipher suites that use ECDHE, GCM and PFS?
See https://wiki.mozilla.org/Security/Server_Side_TLS
This is:
ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA
This is fully compatible all the way back to Windows XP where 3DES will be used.
It also brings Radiator in to compliance with the very likely upcoming:
https://datatracker.ietf.org/doc/draft-ietf-tls-prohibiting-rc4/
Cheers,
Nick
    
    
More information about the radiator
mailing list