-
Notifications
You must be signed in to change notification settings - Fork 160
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SSL cipher order - needs verification #42
Comments
IMHO TLS 1.3 cipher suites should be prioritized. |
some recommendations: |
Hi @rafalfitt So I use the following TLS cipher suites
The top 3 that are prioritized the highest, are TLS 1.3 only
The rest of them are TLS 1.2 only
I used Microsoft's source: https://learn.microsoft.com/en-us/power-platform/admin/server-cipher-tls-requirements There is also Mozilla's source confirming it: Also used this to double check: https://ciphersuite.info/ It can however still be improved. I can remove CBC ones as they are not secure but I will need to test it to see if it won't break anything, or at least not too much.
Please let me know what you think ^^ |
By the way not all of the Cipher Suites shown in Cloudflare website are available in Windows |
|
although you might be right with ChaCha: |
"funny" that TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 is NOT allowed by SCH_USE_STRONG_CRYPTO |
Thank you for bringing it up,
When i was doing research i found out its safer too. And you're totally right, CBC needs to go, i will remove it after i perform some tests tomorrow |
Hi, I've updated the group policies with the change |
Added Untrusted Font Blocking Mitigation to the Top Security category Configured TLS category by removing the insecure CBC TLS Cipher Suites, Please view GitHub Readme TLS section for more info. Configured TLS ECC Curves to utilize more secure curves.
Web page https://ssl-config.mozilla.org/#server=apache&version=2.4.41&config=intermediate&openssl=1.1.1k&guideline=5.7 suggests quite different ordering of SSL ciphers.
The text was updated successfully, but these errors were encountered: