Skip to main content

Questions tagged [cipher-selection]

For questions about the step of the SSL/TLS handshake where the cipher is negotiated between the client and the server. This tag could also be used for questions about which ciphers to support in your application / configuration.

2 votes
1 answer
436 views

server negotiating TLS1.3 but sent TLS1.2 ciphersuite

I sent a client hello indicating TLS1.3 support, and it contains a list of all ciphersuites that support TLS1.3, TLS1.2 and TLS1.1 And consider server negotiated TLS1.3 indicating serverHello....
hjhjh's user avatar
  • 41
2 votes
3 answers
223 views

If I control both sides of a connection, is there any reason to support alternate cipher suites?

If I have a system where I have 100% control over the client operating system and the server operating system, is there any use case for enabling more than one cipher suite (or any of the options that ...
Peter Turner's user avatar
0 votes
2 answers
1k views

docker daemon reports 'tls: unconfigured cipher suite' for Nginx reverse proxy of Artifactory Docker registry

I am migrating to Artifactory on RHEL8 as a Docker remote repository, i.e. Artifactory is a proxy for a docker registry hosted through Jfrog.io. We have a legacy registry with config in /etc/docker/...
bbaassssiiee's user avatar
0 votes
1 answer
259 views

Why is ECC (Eliptical Curve) an `--expert` feature in PGP?

Eleptial Curve is now included in PGP. However when I run gpg2 --full-gen-key, I get Please select what kind of key you want: (1) RSA and RSA (default) (2) DSA and Elgamal (3) DSA (sign only) ...
Evan Carroll's user avatar
  • 2,883
0 votes
1 answer
596 views

TLS 1.3 Cipher Suites: authentication algorithm unspecified?

I was looking at Cipher Suites indicated on SSLLabs and I noticed something, here is a result for google.com (for instance): With TLS 1.2, examples of Cipher Suites are: ...
Weier's user avatar
  • 101
1 vote
0 answers
1k views

Disabling weak cipher suites in Tomcat does not work as expected

I have to get rid of so called "weak security" in a Tomcat application. A penetration test identified services that accept connections with insecure TLS encryption and hashing algorithms: ...
MichaelW's user avatar
  • 161
0 votes
1 answer
999 views

Cipher Suites settings wrong order?

I'm trying to setup a custom order of TLS cipher suites according to this Microsoft list, on Windows Server 2022 but the outcome is not the one that I was expecting. After using the powershell to ...
cadobe's user avatar
  • 3
0 votes
1 answer
225 views

How to create a cipher string that doesn't contain AES and CAMELLIA ciphers?

I am trying to learn about cipher lists and how to order them. I am new to this. I have gone through this doc. I don't get some of the things mentioned in it. Maybe this post can clairfy it. I want to ...
Abhishek Dasgupta's user avatar
0 votes
1 answer
2k views

P-384 vs. SHA384

Forgive my inexperience with encryption, I've been researching this for the better part of the morning and still cannot find a smoking gun answer. A vendor is requesting that we verify a website we ...
wr mem's user avatar
  • 1
1 vote
4 answers
6k views

Which cipher is more secure TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA or TLS_RSA_WITH_AES_256_GCM_SHA384?

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA supports forward secrecy but it doesn't use GCM mode and use SHA1 TLS_RSA_WITH_AES_256_GCM_SHA384 uses GCM mode and SHA2 but it doesn't support forward secrecy. ...
dawklrw's user avatar
  • 11
2 votes
2 answers
623 views

Java support for TLS_DHE_RSA_WITH_AES_128_CCM

My test tool uses java and I need it to use TLS_DHE_RSA_WITH_AES_128_CCM. Does standard java (Oracle) support CCM cipher suites? I am seeing oracle links mentioning CCM but am not able to make it work....
Amal Jesudas's user avatar
2 votes
2 answers
1k views

Cipher suite choice on macOS on Apple Silicon

I have a postfix mail server that accepts these cipher suites: tls_high_cipherlist=ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256: ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384: ...
Synchro's user avatar
  • 727
0 votes
1 answer
591 views

How does TLS use hashing from the negotiated cipher suite

I am trying to understand why TLS only uses hashing algorithm like SHA-384 instead of using an HMAC instance like HMAC-SHA-384. If I understand correctly, this cipher suite (...
A.Ho's user avatar
  • 25
1 vote
0 answers
327 views

Should I manually select protocol and cipher?

I'm writing Java code for a decentralized network. (Proof of concept code here.) Each node generates its own self-signed certificate, to be used both server-side and client-side in every connection. ...
Erhannis's user avatar
  • 111
5 votes
1 answer
9k views

How are key exchange and signature algorithms negotiated in TLS 1.3

In TLS 1.2, the cipher suite lists the algorithms for everything (key exchange, signature, cipher/MAC). So by choosing a suite, all the algorithms will have been negotiated. And I can see them from ...
Linda Wu's user avatar

15 30 50 per page
1
2 3 4 5
14