On Sat, Nov 09, 2013 at 02:57:48PM -0800, Brian Smith wrote:
> Last week, I also learned that ENISA, a European standards group,
> recommends Camellia alongside AES as a future-proof symmetric cipher
> algorithm; see [4].

They recommend:
- *_AES_*_GCM_*
- *_CAMELLIA_*_GCM_*
- *_AES_*_CCM_*

As I already mentioned a few time, I'm still missing some of
the *_AES_*_GCM_* ciphers, specially the DHE ones.

> I think we probably want to still disable Camellia
> cipher suites by default in the long term anyway, but I did not
> disable them in Firefox Nightly yet. In order for it to make sense to
> continue offering Camellia cipher suites long term, we would need to
> improve NSS's support for Camellia to add the ECDHE variants of the
> Camellia cipher suites. Currently, I think the best course of action
> is to let the current configuration ship, then disable Camellia
> support, and eventually add ECDHE_*_WITH_CAMELLIA_* support to NSS, so
> that it is ready in case some problem with AES is found.

I don't understand the part where you want to disable it.


Kurt

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to