Forum Discussion
Enable additional ciphers
Hello ,
Thank you for your response. I will try to update the cipher string on my client ssl profile to this one:
DEFAULT:!SSLv2:!EXPORT:RSA+AES:RSA+3DES:RSA+RC4:ECDHE+AES:ECDHE+3DES:ECDHE+RC4:ECDHE+ECDSA:ECDHE+AES-GCM:!MD5:!SSLv3
and see if that gives me the cipher that we need. I'll update here on how it goes.
Thanks!
Hello Lorenze.
Put this in your CLI:
tmm --clientciphers DEFAULT:!SSLv2:!EXPORT:RSA+AES:RSA+3DES:RSA+RC4:ECDHE+AES:ECDHE+3DES:ECDHE+RC4:ECDHE_ECDSA:ECDHE+AES-GCM:!MD5:!SSLv3If this output shows 'ECDHE-ECDSA' ciphers, then those should be included during TLS handshake.
To validate this, take a traffic capture during those tests and check the TLS client hello to see if those ciphers are included during negotiation.
Regards,
Dario.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com