<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ciphers suites to diable in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/ciphers-suites-to-diable/m-p/4174039#M32134</link>
    <description>Hello all&lt;BR /&gt;which of the following cipher suites is the weakest?&lt;BR /&gt;I should disable the weakest in order to adding more security on the system.&lt;BR /&gt;Obviously i need to forecast impacts in disabling the cipher suite, man pages are not so helpfull.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; openssl ciphers -v&lt;BR /&gt;DHE-RSA-AES256-SHA&lt;BR /&gt;DHE-DSS-AES256-SHA&lt;BR /&gt;AES256-SHA&lt;BR /&gt;EDH-RSA-DES-CBC3-SHA&lt;BR /&gt;EDH-DSS-DES-CBC3-SHA&lt;BR /&gt;DES-CBC3-SHA&lt;BR /&gt;DES-CBC3-MD5&lt;BR /&gt;DHE-RSA-AES128-SHA&lt;BR /&gt;DHE-DSS-AES128-SHA&lt;BR /&gt;AES128-SHA&lt;BR /&gt;IDEA-CBC-SHA&lt;BR /&gt;IDEA-CBC-MD5&lt;BR /&gt;RC2-CBC-MD5&lt;BR /&gt;DHE-DSS-RC4-SHA&lt;BR /&gt;RC4-SHA&lt;BR /&gt;RC4-MD5&lt;BR /&gt;RC4-MD5&lt;BR /&gt;RC4-64-MD5&lt;BR /&gt;EXP1024-DHE-DSS-DES-CBC-SHA&lt;BR /&gt;EXP1024-DES-CBC-SHA&lt;BR /&gt;EXP1024-RC2-CBC-MD5&lt;BR /&gt;EDH-RSA-DES-CBC-SHA&lt;BR /&gt;EDH-DSS-DES-CBC-SHA&lt;BR /&gt;DES-CBC-SHA&lt;BR /&gt;DES-CBC-MD5&lt;BR /&gt;EXP1024-DHE-DSS-RC4-SHA&lt;BR /&gt;EXP1024-RC4-SHA&lt;BR /&gt;EXP1024-RC4-MD5&lt;BR /&gt;EXP-EDH-RSA-DES-CBC-SHA&lt;BR /&gt;EXP-EDH-DSS-DES-CBC-SHA&lt;BR /&gt;EXP-DES-CBC-SHA&lt;BR /&gt;EXP-RC2-CBC-MD5&lt;BR /&gt;EXP-RC2-CBC-MD5&lt;BR /&gt;EXP-RC4-MD5&lt;BR /&gt;EXP-RC4-MD5&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks in advance &lt;BR /&gt;RV</description>
    <pubDate>Fri, 04 Apr 2008 12:06:14 GMT</pubDate>
    <dc:creator>Roberto Volsa</dc:creator>
    <dc:date>2008-04-04T12:06:14Z</dc:date>
    <item>
      <title>Ciphers suites to diable</title>
      <link>https://community.hpe.com/t5/operating-system-linux/ciphers-suites-to-diable/m-p/4174039#M32134</link>
      <description>Hello all&lt;BR /&gt;which of the following cipher suites is the weakest?&lt;BR /&gt;I should disable the weakest in order to adding more security on the system.&lt;BR /&gt;Obviously i need to forecast impacts in disabling the cipher suite, man pages are not so helpfull.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; openssl ciphers -v&lt;BR /&gt;DHE-RSA-AES256-SHA&lt;BR /&gt;DHE-DSS-AES256-SHA&lt;BR /&gt;AES256-SHA&lt;BR /&gt;EDH-RSA-DES-CBC3-SHA&lt;BR /&gt;EDH-DSS-DES-CBC3-SHA&lt;BR /&gt;DES-CBC3-SHA&lt;BR /&gt;DES-CBC3-MD5&lt;BR /&gt;DHE-RSA-AES128-SHA&lt;BR /&gt;DHE-DSS-AES128-SHA&lt;BR /&gt;AES128-SHA&lt;BR /&gt;IDEA-CBC-SHA&lt;BR /&gt;IDEA-CBC-MD5&lt;BR /&gt;RC2-CBC-MD5&lt;BR /&gt;DHE-DSS-RC4-SHA&lt;BR /&gt;RC4-SHA&lt;BR /&gt;RC4-MD5&lt;BR /&gt;RC4-MD5&lt;BR /&gt;RC4-64-MD5&lt;BR /&gt;EXP1024-DHE-DSS-DES-CBC-SHA&lt;BR /&gt;EXP1024-DES-CBC-SHA&lt;BR /&gt;EXP1024-RC2-CBC-MD5&lt;BR /&gt;EDH-RSA-DES-CBC-SHA&lt;BR /&gt;EDH-DSS-DES-CBC-SHA&lt;BR /&gt;DES-CBC-SHA&lt;BR /&gt;DES-CBC-MD5&lt;BR /&gt;EXP1024-DHE-DSS-RC4-SHA&lt;BR /&gt;EXP1024-RC4-SHA&lt;BR /&gt;EXP1024-RC4-MD5&lt;BR /&gt;EXP-EDH-RSA-DES-CBC-SHA&lt;BR /&gt;EXP-EDH-DSS-DES-CBC-SHA&lt;BR /&gt;EXP-DES-CBC-SHA&lt;BR /&gt;EXP-RC2-CBC-MD5&lt;BR /&gt;EXP-RC2-CBC-MD5&lt;BR /&gt;EXP-RC4-MD5&lt;BR /&gt;EXP-RC4-MD5&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks in advance &lt;BR /&gt;RV</description>
      <pubDate>Fri, 04 Apr 2008 12:06:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/ciphers-suites-to-diable/m-p/4174039#M32134</guid>
      <dc:creator>Roberto Volsa</dc:creator>
      <dc:date>2008-04-04T12:06:14Z</dc:date>
    </item>
    <item>
      <title>Re: Ciphers suites to diable</title>
      <link>https://community.hpe.com/t5/operating-system-linux/ciphers-suites-to-diable/m-p/4174040#M32135</link>
      <description>If you are setting up a public site, you'll need to know what algorithms are most likely to be supported by the various client applications. It's no good to have a secure site, if it is inaccessible by your potential users.&lt;BR /&gt;&lt;BR /&gt;To get up-to-date information, you should Google for recent research on cryptography and SSL/TLS usage.&lt;BR /&gt;&lt;BR /&gt;For example, a search with words "crypto algorithm strength compare" produced this hit that looks useable for you:&lt;BR /&gt;&lt;A href="http://www.imconf.net/imc-2007/papers/imc130.pdf" target="_blank"&gt;http://www.imconf.net/imc-2007/papers/imc130.pdf&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;A quick summary:&lt;BR /&gt;&lt;BR /&gt;Single-DES is far too weak, so you should disallow DES-CBC-SHA and DES-CBC-MD5.&lt;BR /&gt;&lt;BR /&gt;Triple-DES (DES-CBC3-*) is still adequate, but inefficient: it's slower than other algorithms of equivalent strength. You should prefer something else over triple-DES, but you can still allow triple-DES if necessary for compatibility.&lt;BR /&gt;&lt;BR /&gt;You should prefer &lt;ANYTHING&gt;-SHA over &lt;ANYTHING&gt;-MD5, although both SHA and MD5 seem to be still OK (so far) when used in the specific way SSL 3.0 and TLS 1.0 use them.&lt;BR /&gt;&lt;BR /&gt;Whatever you do, avoid SSL version 2.0 if possible: that protocol version has serious flaws that can undermine the strength of any cipher used with it.&lt;BR /&gt;&lt;BR /&gt;MK&lt;/ANYTHING&gt;&lt;/ANYTHING&gt;</description>
      <pubDate>Sat, 05 Apr 2008 11:37:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/ciphers-suites-to-diable/m-p/4174040#M32135</guid>
      <dc:creator>Matti_Kurkela</dc:creator>
      <dc:date>2008-04-05T11:37:58Z</dc:date>
    </item>
  </channel>
</rss>

