Forum Discussion

dmezack_359144's avatar
dmezack_359144
Icon for Nimbostratus rankNimbostratus
Apr 19, 2018

Weak DH Keys solved by !DHE?

Adding !DHE to the below F5 SSL profile cipher string (11.X & 12.X) resolved the below SSL Labs issue.

 

DEFAULT:!LOW:!RC4:!MD5:!SHA1:!ADH:!DHE:!DES:!3DES:!EXP

 

Resolved: Weak Diffie-Hellman (DH) key exchange parameters. (Grade capped to B)

 

Unlike !DH, this option allows below Diffie Hellman ciphers.

 

  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030) ECDH secp384r1 (eq. 7680 bits RSA) FS 256
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f) ECDH secp384r1 (eq. 7680 bits RSA) FS 128
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028) ECDH secp384r1 (eq. 7680 bits RSA) FS 256
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027) ECDH secp384r1 (eq. 7680 bits RSA) FS 128

Please confirm the above ECDHE_RSA implementations are immune to the weak DH key exchange risk.