We have moved to a new Sailfish OS Forum. Please start new discussions there.
1 | initial version | posted 2015-06-25 18:22:31 +0200 |
Please add ciphers stronger than ECDHE-ECDSA-AES256-SHA1 Right now one has to either use AES128 and SHA256 or AES256 and SHA1 if one wants to use the elliptic curve DH key exchange.
Performance is not an issue with stronger ciphers. Web Pirate already supports them.
You can test the cipher support by visiting https://cc.dcsec.uni-hannover.de/ with the jolla browser.
2 | retagged |
Please add ciphers stronger than ECDHE-ECDSA-AES256-SHA1 Right now one has to either use AES128 and SHA256 or AES256 and SHA1 if one wants to use the elliptic curve DH key exchange.
Performance is not an issue with stronger ciphers. Web Pirate already supports them.
You can test the cipher support by visiting https://cc.dcsec.uni-hannover.de/ with the jolla browser.
3 | No.3 Revision |
Please add ciphers stronger than ECDHE-ECDSA-AES256-SHA1 Right now one has to either use AES128 and SHA256 or AES256 and SHA1 if one wants to use the elliptic curve DH key exchange.
Performance is not an issue with stronger ciphers. Web Pirate already supports them.
You can test the cipher support by visiting https://cc.dcsec.uni-hannover.de/ with the jolla browser.
My suggestion would be to add the following until openssl supports chacha or libressl takes over the world:
ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(256) Mac=AEAD
ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD
ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA384
4 | retagged |
Please add ciphers stronger than ECDHE-ECDSA-AES256-SHA1 Right now one has to either use AES128 and SHA256 or AES256 and SHA1 if one wants to use the elliptic curve DH key exchange.
Performance is not an issue with stronger ciphers. Web Pirate already supports them.
You can test the cipher support by visiting https://cc.dcsec.uni-hannover.de/ with the jolla browser.
My suggestion would be to add the following until openssl supports chacha or libressl takes over the world:
ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(256) Mac=AEAD
ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD
ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA384