Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ciphers marked weak by SSL Labs #98

Open
mattwwarren opened this issue Jun 15, 2018 · 6 comments
Open

Ciphers marked weak by SSL Labs #98

mattwwarren opened this issue Jun 15, 2018 · 6 comments

Comments

@mattwwarren
Copy link

mattwwarren commented Jun 15, 2018

The follower ciphers have been marked as Weak by ssllabs and while it does not result in a lower grade, I wanted to get Cloudflare's opinion on deprecating support for these ciphers:

  • TLS_RSA_WITH_AES_128_GCM_SHA256
  • TLS_RSA_WITH_AES_128_CBC_SHA
  • TLS_RSA_WITH_AES_128_CBC_SHA256
  • TLS_RSA_WITH_AES_256_GCM_SHA384
  • TLS_RSA_WITH_AES_256_CBC_SHA
  • TLS_RSA_WITH_AES_256_CBC_SHA256

I believe this would require removing the following from ssl_ciphers:
RSA+AES128 and RSA+AES256

Thanks in advance!

@injust
Copy link
Contributor

injust commented Jun 15, 2018

Pretty sure this repository is just for Cloudflare to open-source their config and patches, and that they don't take contributions (except for a few updated patches).

@mattwwarren
Copy link
Author

Not necessarily expecting the change to happen but considering that they position themselves as a global leader in internet security, I was curious to hear their opinion on deprecating the ciphers.

@hakasenyang
Copy link

What do you think about this method?

Weak ciphers apply only to TLSv1.

Ex) https://www.ssllabs.com/ssltest/analyze.html?d=hakase.io

@omerlh
Copy link

omerlh commented Nov 11, 2019

I'm also seeing weak ciphers on TLS 1.2:

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)   ECDH x25519 (eq. 3072 bits RSA)   FS   WEAK 128
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027)   ECDH x25519 (eq. 3072 bits RSA)   FS   WEAK 128
TLS_RSA_WITH_AES_128_GCM_SHA256 (0x9c)   WEAK 128
TLS_RSA_WITH_AES_128_CBC_SHA (0x2f)   WEAK 128
TLS_RSA_WITH_AES_128_CBC_SHA256 (0x3c)   WEAK 128
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)   ECDH x25519 (eq. 3072 bits RSA)   FS   WEAK 256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028)   ECDH x25519 (eq. 3072 bits RSA)   FS   WEAK 256
TLS_RSA_WITH_AES_256_GCM_SHA384 (0x9d)   WEAK 256
TLS_RSA_WITH_AES_256_CBC_SHA (0x35)   WEAK 256
TLS_RSA_WITH_AES_256_CBC_SHA256 (0x3d)   WEAK

Any plan to handle it?

@grodriguezl
Copy link

Any news about this?

@nickysemenza
Copy link
Member

Hi! while we do sometimes remove ciphers completely, we try to have defaults that are as backward compatible as possible (i.e. towards devices where the weak ciphers are the best they have). This config is the default for us though, we currently allow customers to change the minimum TLS version or restrict the ciphers offered on their zone to a subset of the ones that we support: https://developers.cloudflare.com/ssl/ssl-tls/cipher-suites/#disable-cipher-suites. Some take advantage of this for policy reasons, others to boost their SSL Labs score.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

6 participants