I am using Marlene Pratt's "Proposal to Remove legacy TLS Ciphersuits Offered 
by Firefox" from 13 Dec 2013 on dev-tech-crypto mailing list as a guideline.

I present a proposal to remove some legacy ciphersuites from the initial 
handshake presented by Firefox.

In Firefox 36, we have removed RC4 from the initial handshake, as well as 
implemented a secondary/fallback handshake for badly configured servers.

I have read the updated version of best current practices regarding 
Recommendations for Secure Use of TLS and DTLS:

https://tools.ietf.org/html/draft-ietf-uta-tls-bcp-11

These are the default available ciphersuites in Firefox 36.0:

C02B  TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
C02F  TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
C00A  TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
C009  TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
C013  TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
C014  TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
0033  TLS_DHE_RSA_WITH_AES_128_CBC_SHA
0032  TLS_DHE_DSS_WITH_AES_128_CBC_SHA
0039  TLS_DHE_RSA_WITH_AES_256_CBC_SHA
002F  TLS_RSA_WITH_AES_128_CBC_SHA
0035  TLS_RSA_WITH_AES_256_CBC_SHA
000A  TLS_RSA_WITH_3DES_EDE_CBC_SHA

I propose removal of the following ciphersuite:

0032  TLS_DHE_DSS_WITH_AES_128_CBC_SHA

because DSS (the non-EC version) is obsolete, and based on preliminary 
telemetry and Pulse data is not being negotiated at all with any servers out 
there. My testing indicates that there are no public nor private servers that 
would support only this ciphersuit - please provide some data if you think 
otherwise.

I also propose removing the following ciphersuit:

000A  TLS_RSA_WITH_3DES_EDE_CBC_SHA

because 3DES is a cipher that requires too much computing power compared to 
AES, much more computer memory, lacks hardware acceleration on servers, is 
rarely negotiated, has had its bitstrenght reduced below 128bits, and its 
removal is on track with avoiding (and eventually removing) RSA key exchange. 
Additionally, the servers that support (or even prefer!) 3DES always support 
some AES ciphersuit too.

This would bring the list of presented ciphersuites down to:

C02B  TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
C02F  TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
C00A  TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
C009  TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
C013  TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
C014  TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
0033  TLS_DHE_RSA_WITH_AES_128_CBC_SHA
0039  TLS_DHE_RSA_WITH_AES_256_CBC_SHA
002F  TLS_RSA_WITH_AES_128_CBC_SHA
0035  TLS_RSA_WITH_AES_256_CBC_SHA

The secondary/fallback handshake can still offer the ciphersuites proposed for 
removal. Main point is we want to show servers that we intend to keep the list 
of supported ciphersuites modern and secure.

The benefits of this change remain the same as in Marlene Pratt's original 
proposal. Given that it took 10 (ten) Firefox versions (from Firefox 26 to 
Firefox 36) to implement the previous proposal, now is a good time to start 
talking about this new proposal. Hopefully it will not take until Firefox 46 to 
have it implemented.
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to