Last time we have discussed it[1], the only voices against were about removal
of RC4 ciphers from default
What is the exact ordering of ALL:COMPLEMENTOFALL in boringssl?
1 - http://openssl.6102.n7.nabble.com/Insecure-DEFAULT-cipher-set-td48995.html
--
Regards,
Hubert Kario
Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic
they don't differ...
but comparing that to what Fedora version of openssl outputs, then new order
certainly makes things a bit better.
there are few issues still
- aRSA preferred before aECDSA
- AES256 before AES128 in general
- few export grade ciphers placed before secure ciphers
- 3DES is placed arbitrarily
I'd prefer not only change the order, but also say what was the intent and
what is the preferred ordering (which keys are used for ordering), so that
when new ciphers come, it will be more or less obvious where they should be
placed
--
Regards,
Hubert Kario
Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic
to this specific issue, yes, but in general fixing ordering also with relation
to PFS is a good idea
--
Regards,
Hubert Kario
Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic
Agree about AEAD before non-AEAD. As for ChaCha20 vs AES-GCM, as long as we don’t have evidence that on is significantly weaker than the other, I don’t think preferences should depend on security arguments, but on performance. Unfortunately , this is difficult to determine, because AES-GCM is faster on modern Intel processors, but slower on older processors and on ARM. It really depends on the application which is preferable.
If we don’t want preference to be user-determined, I guess AES-GCM is more likely to be the preferred cipher for most servers.
Yoav