On Fri, Jan 30, 2009 at 9:32 AM, Glen Beasley wrote:
>
> For recommend ciphersuites, how about:
>
> TLS_RSA_WITH_AES_128_CBC_SHA
> TLS_DHE_RSA_WITH_AES_128_CBC_SHA
I concur. Note that TLS_RSA_WITH_AES_128_CBC_SHA is the
mandatory cipher suite in TLS 1.2 (http://www.ietf.org/rfc/rfc5246.txt,
Sect
Nelson B Bolyard wrote:
Sreedhar Kamishetti wrote on 2009-01-29 16:28 PST:
I just started to use JSS/NSS. So, if hope some one will reply to this
post.
We use SSL_DH_anon_WITH_3DES_EDE_CBC_SHA” as cipher suite for
communication between SSL Peers. Client is in Java and Server is in C
(uses
Sreedhar Kamishetti wrote on 2009-01-29 16:28 PST:
> I just started to use JSS/NSS. So, if hope some one will reply to this
> post.
>
> We use SSL_DH_anon_WITH_3DES_EDE_CBC_SHA” as cipher suite for
> communication between SSL Peers. Client is in Java and Server is in C
> (uses OpenSSL).
>
> I
Hello,
I just started to use JSS/NSS. So, if hope some one will reply to this
post.
We use SSL_DH_anon_WITH_3DES_EDE_CBC_SHA" as cipher suite for
communication between SSL Peers. Client is in Java and Server is in C
(uses OpenSSL).
I am trying to use JSS/NSS for Client side SSL Provide
4 matches
Mail list logo