Forum Discussion
joshm_46566
Nimbostratus
May 08, 2015IE8/XP compatible cipher suite
Trying to arrive at a SSL cipher suite that'll mitigate the recent vulnerabilities but still allow legacy IE8/XP clients to negotiate. We're currently on v11.6 and our suite is DEFAULT:!RSA:DHE-RSA-...
joshm_46566
Nimbostratus
May 12, 2015We get the error when attempting to apply NATIVE+HIGH:NATIVE+MEDIUM:!SSLv3:!RC4:!ADH on an existing profile.
tmm --clientciphers 'DEFAULT'
ID SUITE BITS PROT METHOD CIPHER MAC KEYX
0: 159 DHE-RSA-AES256-GCM-SHA384 256 TLS1.2 Native AES-GCM SHA384 EDH/RSA
1: 158 DHE-RSA-AES128-GCM-SHA256 128 TLS1.2 Native AES-GCM SHA256 EDH/RSA
2: 57 DHE-RSA-AES256-SHA 256 TLS1 Native AES SHA EDH/RSA
3: 57 DHE-RSA-AES256-SHA 256 TLS1.1 Native AES SHA EDH/RSA
4: 57 DHE-RSA-AES256-SHA 256 TLS1.2 Native AES SHA EDH/RSA
5: 57 DHE-RSA-AES256-SHA 256 DTLS1 Native AES SHA EDH/RSA
6: 51 DHE-RSA-AES128-SHA 128 TLS1 Native AES SHA EDH/RSA
7: 51 DHE-RSA-AES128-SHA 128 TLS1.1 Native AES SHA EDH/RSA
8: 51 DHE-RSA-AES128-SHA 128 TLS1.2 Native AES SHA EDH/RSA
9: 51 DHE-RSA-AES128-SHA 128 DTLS1 Native AES SHA EDH/RSA
10: 22 DHE-RSA-DES-CBC3-SHA 192 TLS1 Native DES SHA EDH/RSA
11: 22 DHE-RSA-DES-CBC3-SHA 192 TLS1.1 Native DES SHA EDH/RSA
12: 22 DHE-RSA-DES-CBC3-SHA 192 TLS1.2 Native DES SHA EDH/RSA
13: 22 DHE-RSA-DES-CBC3-SHA 192 DTLS1 Native DES SHA EDH/RSA
14: 157 AES256-GCM-SHA384 256 TLS1.2 Native AES-GCM SHA384 RSA
15: 156 AES128-GCM-SHA256 128 TLS1.2 Native AES-GCM SHA256 RSA
16: 61 AES256-SHA256 256 TLS1.2 Native AES SHA256 RSA
17: 53 AES256-SHA 256 TLS1 Native AES SHA RSA
18: 53 AES256-SHA 256 TLS1.1 Native AES SHA RSA
19: 53 AES256-SHA 256 TLS1.2 Native AES SHA RSA
20: 53 AES256-SHA 256 DTLS1 Native AES SHA RSA
21: 60 AES128-SHA256 128 TLS1.2 Native AES SHA256 RSA
22: 47 AES128-SHA 128 TLS1 Native AES SHA RSA
23: 47 AES128-SHA 128 TLS1.1 Native AES SHA RSA
24: 47 AES128-SHA 128 TLS1.2 Native AES SHA RSA
25: 47 AES128-SHA 128 DTLS1 Native AES SHA RSA
26: 10 DES-CBC3-SHA 192 TLS1 Native DES SHA RSA
27: 10 DES-CBC3-SHA 192 TLS1.1 Native DES SHA RSA
28: 10 DES-CBC3-SHA 192 TLS1.2 Native DES SHA RSA
29: 10 DES-CBC3-SHA 192 DTLS1 Native DES SHA RSA
30: 49200 ECDHE-RSA-AES256-GCM-SHA384 256 TLS1.2 Native AES-GCM SHA384 ECDHE_RSA
31: 49199 ECDHE-RSA-AES128-GCM-SHA256 128 TLS1.2 Native AES-GCM SHA256 ECDHE_RSA
32: 49192 ECDHE-RSA-AES256-SHA384 256 TLS1.2 Native AES SHA384 ECDHE_RSA
33: 49172 ECDHE-RSA-AES256-CBC-SHA 256 TLS1 Native AES SHA ECDHE_RSA
34: 49172 ECDHE-RSA-AES256-CBC-SHA 256 TLS1.1 Native AES SHA ECDHE_RSA
35: 49172 ECDHE-RSA-AES256-CBC-SHA 256 TLS1.2 Native AES SHA ECDHE_RSA
36: 49191 ECDHE-RSA-AES128-SHA256 128 TLS1.2 Native AES SHA256 ECDHE_RSA
37: 49171 ECDHE-RSA-AES128-CBC-SHA 128 TLS1 Native AES SHA ECDHE_RSA
38: 49171 ECDHE-RSA-AES128-CBC-SHA 128 TLS1.1 Native AES SHA ECDHE_RSA
39: 49171 ECDHE-RSA-AES128-CBC-SHA 128 TLS1.2 Native AES SHA ECDHE_RSA
40: 49170 ECDHE-RSA-DES-CBC3-SHA 192 TLS1 Native DES SHA ECDHE_RSA
41: 49170 ECDHE-RSA-DES-CBC3-SHA 192 TLS1.1 Native DES SHA ECDHE_RSA
42: 49170 ECDHE-RSA-DES-CBC3-SHA 192 TLS1.2 Native DES SHA ECDHE_RSA
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects
