You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
AES-GCM or CHACHA20_POLY1305 ciphers must be used in current version of
Chrome to avoid an 'obsolete cryptography' warning.
Prefer 128 bit AES over 192 and 256 bit AES considering attacks that
specifically affect the larger key sizes but do not affect AES 128.
PR-URL: #1660
Reviewed-By: Fedor Indutny <[email protected]>
Reviewed-By: Shigeki Ohtsu <[email protected]>
Reviewed-By: Roman Reiss <[email protected]>
The default cipher suite prefers ECDHE and DHE ciphers for Perfect Forward
149
-
secrecy, while offering *some* backward compatibiltity. Old clients which
150
-
rely on insecure and deprecated RC4 or DES-based ciphers (like Internet
151
-
Explorer 6) aren't able to complete the handshake with the default
144
+
ECDHE-RSA-AES128-GCM-SHA256:
145
+
ECDHE-ECDSA-AES128-GCM-SHA256:
146
+
ECDHE-RSA-AES256-GCM-SHA384:
147
+
ECDHE-ECDSA-AES256-GCM-SHA384:
148
+
DHE-RSA-AES128-GCM-SHA256:
149
+
ECDHE-RSA-AES128-SHA256:
150
+
DHE-RSA-AES128-SHA256:
151
+
ECDHE-RSA-AES256-SHA384:
152
+
DHE-RSA-AES256-SHA384:
153
+
ECDHE-RSA-AES256-SHA256:
154
+
DHE-RSA-AES256-SHA256:
155
+
HIGH:
156
+
!aNULL:
157
+
!eNULL:
158
+
!EXPORT:
159
+
!DES:
160
+
!RC4:
161
+
!MD5:
162
+
!PSK:
163
+
!SRP:
164
+
!CAMELLIA
165
+
166
+
The default cipher suite prefers GCM ciphers for [Chrome's 'modern
167
+
cryptography' setting] and also prefers ECDHE and DHE ciphers for Perfect
168
+
Forward secrecy, while offering *some* backward compatibiltity.
169
+
170
+
128 bit AES is preferred over 192 and 256 bit AES in light of [specific
171
+
attacks affecting larger AES key sizes].
172
+
173
+
Old clients that rely on insecure and deprecated RC4 or DES-based ciphers
174
+
(like Internet Explorer 6) aren't able to complete the handshake with the default
152
175
configuration. If you absolutely must support these clients, the
153
176
[TLS recommendations] may offer a compatible cipher suite. For more details
154
177
on the format, see the [OpenSSL cipher list format documentation].
@@ -784,6 +807,8 @@ The string representation of the local IP address.
784
807
The numeric representation of the local port.
785
808
786
809
[OpenSSL cipher list format documentation]: http://www.openssl.org/docs/apps/ciphers.html#CIPHER_LIST_FORMAT
0 commit comments