Am Wed, 3 May 2017 16:23:52 +0000
schrieb Lukas Tribus <luky...@hotmail.com>:

> Currently we unconditionally set SSL_OP_CIPHER_SERVER_PREFERENCE [1],
> which may not always be a good thing.

I fully agree with you.
One of my customer use nginx and I have activated the
ssl_prefer_server_ciphers. This was not that good just because a lot of
the clients wasn't able to connect.

Luckily I was able to deactivate this on nginx and it would be nice to
have such a option also in the famos product called haproxy ;-)

Regards
Aleks

> The benefit of server side cipher prioritization may not apply to all
> cases out there, and it appears that the various SSL libs are going
> away from this recommendation ([2], [3]), as insecure ciphers suites
> are properly blacklisted/removed and honoring the client's preference
> is more likely to improve user experience  (for example using
> SW-friendly ciphers on devices without HW AES support).
> 
> This is especially true for TLSv1.3, which will restrict the cipher
> suites to just AES-GCM and Chacha20/Poly1305.
> 
> Apache [4], nginx [5] and others give admins full flexibility, we
> should as well.
> 
> The initial proposal to change the current default and add a
> "prefer-server-ciphers" option (as implemented in e566ecb) has been
> declined due to the possible security impact.
> 
> This patch implements prefer-client-ciphers without changing the
> defaults.
> 
> [1] https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_options.html
> [2] https://github.com/openssl/openssl/issues/541
> [3] https://github.com/libressl-portable/portable/issues/66
> [4]
> https://httpd.apache.org/docs/2.0/en/mod/mod_ssl.html#sslhonorcipherorder
> [5]
> https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_prefer_server_ciphers
> --- v2 patch doesn't change defaults and implements
> prefer-client-ciphers instead of "prefer-server-ciphers".

[snipp]

Reply via email to