Conversation

Replying to
Yeah I was kinda confused by their cipher warnings. OTOH I like that they're the only site that didn't say either "you're perfect" or "you're insecure because MTA-STS is required to be secure".
1
Replying to and
They want to force using the strongest available ciphers while Mozilla just wants 128-bit security or better with forward secrecy. Using the Mozilla configuration and changing server cipher to `on` will pass all the test suites like this following EU guidelines with no real loss.
1
1
Replying to and
TLSv1.3 is a lot saner. It only has ECDHE (no DHE parameter gotchas) and OpenSSL only implements the 5 standard ciphers which all have at least 128-bit security and forward secrecy. Gets rid of all the obscure curves too. That's why the Modern configuration has no cipher config.
1
1
Replying to and
Security level for DHE / ECDHE key exchange matters more than the actual certificate due to forward secrecy. If at some point RSA 2048 is broken, it doesn't matter if you used RSA 2048 keys for certificates today as long as you only ever used ciphers with forward secrecy today.
1
1
Show replies
Replying to
Isn't there a way to prevent downgrade when client does support TLS 1.3, by validating the session prior to handshake after making the handshake? Or is that just not supported still?
1
Show replies