We have moved to a new Sailfish OS Forum. Please start new discussions there.

Revision history [back]

click to hide/show revision 1
initial version

posted 2015-06-25 18:22:31 +0200

Support for stronger ciphers in the browser

Please add ciphers stronger than ECDHE-ECDSA-AES256-SHA1 Right now one has to either use AES128 and SHA256 or AES256 and SHA1 if one wants to use the elliptic curve DH key exchange.

Performance is not an issue with stronger ciphers. Web Pirate already supports them.

You can test the cipher support by visiting https://cc.dcsec.uni-hannover.de/ with the jolla browser.

Support for stronger ciphers in the browser

Please add ciphers stronger than ECDHE-ECDSA-AES256-SHA1 Right now one has to either use AES128 and SHA256 or AES256 and SHA1 if one wants to use the elliptic curve DH key exchange.

Performance is not an issue with stronger ciphers. Web Pirate already supports them.

You can test the cipher support by visiting https://cc.dcsec.uni-hannover.de/ with the jolla browser.

Support for stronger ciphers in the browser

Please add ciphers stronger than ECDHE-ECDSA-AES256-SHA1 Right now one has to either use AES128 and SHA256 or AES256 and SHA1 if one wants to use the elliptic curve DH key exchange.

Performance is not an issue with stronger ciphers. Web Pirate already supports them.

You can test the cipher support by visiting https://cc.dcsec.uni-hannover.de/ with the jolla browser.

My suggestion would be to add the following until openssl supports chacha or libressl takes over the world:

ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESGCM(256) Mac=AEAD
ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AESGCM(256) Mac=AEAD
ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AES(256)  Mac=SHA384

Support for stronger ciphers in the browser

Please add ciphers stronger than ECDHE-ECDSA-AES256-SHA1 Right now one has to either use AES128 and SHA256 or AES256 and SHA1 if one wants to use the elliptic curve DH key exchange.

Performance is not an issue with stronger ciphers. Web Pirate already supports them.

You can test the cipher support by visiting https://cc.dcsec.uni-hannover.de/ with the jolla browser.

My suggestion would be to add the following until openssl supports chacha or libressl takes over the world:

ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESGCM(256) Mac=AEAD
ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AESGCM(256) Mac=AEAD
ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AES(256)  Mac=SHA384