Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:71710 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 75914 invoked from network); 29 Jan 2014 02:40:02 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 29 Jan 2014 02:40:02 -0000 Authentication-Results: pb1.pair.com smtp.mail=yohgaki@gmail.com; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=yohgaki@gmail.com; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.217.177 as permitted sender) X-PHP-List-Original-Sender: yohgaki@gmail.com X-Host-Fingerprint: 209.85.217.177 mail-lb0-f177.google.com Received: from [209.85.217.177] ([209.85.217.177:52457] helo=mail-lb0-f177.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 1D/0E-01140-FF968E25 for ; Tue, 28 Jan 2014 21:39:59 -0500 Received: by mail-lb0-f177.google.com with SMTP id z5so991219lbh.8 for ; Tue, 28 Jan 2014 18:39:56 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc:content-type; bh=lSJzs7b4MbMSWq/yCkFyA90QuEkjCXRSe2b9KSLX9JI=; b=osxDXV96XwEhVm0llI7I+tKuLA1t8y0vDWo46ZmNHWjjTiQUCLWHyDbnEKjDM5nfpu D8cJABQnXRfJCPhemkKtpewL7c6b66U4hKcIia8MMsY0EKO9uHOBHFSvlcF55rkyejdc OfYgtRN7e6lISeVBJor+it+Nt5I3bhDCXiKDey7eSrFPctI2dxs0fxFQCMELEm9d8mWz nl96oSYqXpmmH0sxEbvjA9rFUi6t80PWZccWNRrFSpm0iU3XBF1aCYx8gWtiWJ7Fnt07 6eK9E7nz2cKYNQG5o9I65cnp+7FawYajcm0skT+1JadCNTY5afbNccmy4I/B6ZRud6Wb t6BQ== X-Received: by 10.112.151.42 with SMTP id un10mr3191574lbb.7.1390963196364; Tue, 28 Jan 2014 18:39:56 -0800 (PST) MIME-Version: 1.0 Sender: yohgaki@gmail.com Received: by 10.112.199.37 with HTTP; Tue, 28 Jan 2014 18:39:16 -0800 (PST) In-Reply-To: References: Date: Wed, 29 Jan 2014 11:39:16 +0900 X-Google-Sender-Auth: m70Z5lXQUF-2NifgKcD8IFOlRG4 Message-ID: To: Daniel Lowrey Cc: "internals@lists.php.net" Content-Type: multipart/alternative; boundary=047d7b3435b6370b4104f112db54 Subject: Re: [PHP-DEV] [RFC] Improved TLS Defaults From: yohgaki@ohgaki.net (Yasuo Ohgaki) --047d7b3435b6370b4104f112db54 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Hi Daniel, On Wed, Jan 29, 2014 at 6:50 AM, Daniel Lowrey wrote: > I've created a new RFC to discuss improving default TLS encryption > settings: > > https://wiki.php.net/rfc/improved-tls-defaults > > This RFC complements the previously accepted TLS Peer Verification RFC. > > I've proposed these (relatively straight-forward) changes in RFC form > because there does exist the potential for minimal BC breakage. I see thi= s > breakage as a good thing because it enhances security, however everyone m= ay > not share this view. > I haven't read the RFC carefully yet, but it's great proposal! You probably reviewed this page already. https://wiki.mozilla.org/Security/Server_Side_TLS Quoting from the page The general purpose ciphersuite at the time of this writing is: ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-= GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-= AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SH= A256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:EC= DHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA= -AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA2= 56:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA38= 4:ECDHE-RSA-RC4-SHA:ECDHE-ECDSA-RC4-SHA:AES128:AES256:RC4-SHA:HIGH:!aNULL:!= eNULL:!EXPORT:!DES:!3DES:!MD5:!PSK Is your recommendation from OpenSSL project or else? I couldn't find a page with quick search. @STRENGTH Additionally the cipher string @STRENGTH can be used at any point to sort the current cipher list in order of encryption algorithm key length. https://www.openssl.org/docs/apps/ciphers.html @STRENGTH orders cipher as mozilla recommend? It seems this option is for this and/or similar purpose. Slight differences do not matter much so having @STRENGH is secure and easier to maintain, probably. Regards, -- Yasuo Ohgaki yohgaki@ohgaki.net --047d7b3435b6370b4104f112db54--