Forum Discussion

jwlarger's avatar
jwlarger
Icon for Cirrus rankCirrus
May 21, 2019

Selecting non-CBC ciphers

Qualys downgraded CBC and so we are dealing with reports that these ciphers are weak. Like: 

 

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028) WEAK

 

So, all our app owners are asking how to avoid them. I found this, since the scanners prefer GCM, but it is perhaps too limiting:

 

 # tmm --clientciphers ECDHE+AES-GCM

 

   ID SUITE              BITS PROT  METHOD CIPHER MAC  KEYX

 

0: 49200 ECDHE-RSA-AES256-GCM-SHA384   256 TLS1.2 Native AES-GCM SHA384 ECDHE_RSA 

 

 1: 49199 ECDHE-RSA-AES128-GCM-SHA256   128 TLS1.2 Native AES-GCM SHA256 ECDHE_RSA

 

After all, there are still a lot of OLD clients out there. How is everyone dealing with this change? 

  • Hamish's avatar
    Hamish
    Icon for Cirrocumulus rankCirrocumulus

    You make a concious decision.

     

    1. Do you wish to (insecurely) 'support' old insecure clients?
    2. Or do you wish to be secure?

     

    Seriously. This is an age old one that goes back to the early days of IE with 56-bit encryption. Then we inserted a redirect for anyone with bad encryption to a page saying update your browser. I'd probably recommend the same today.