On Saturday 28 February 2015 01:03:39 nellie.pet...@safe-mail.net wrote:
> I am using Marlene Pratt's "Proposal to Remove legacy TLS Ciphersuits
> Offered by Firefox" from 13 Dec 2013 on dev-tech-crypto mailing list as a
> guideline.
> 
> I present a proposal to remove some legacy ciphersuites from the initial
> handshake presented by Firefox.
> 
> In Firefox 36, we have removed RC4 from the initial handshake, as well as
> implemented a secondary/fallback handshake for badly configured servers.
> 
> I have read the updated version of best current practices regarding
> Recommendations for Secure Use of TLS and DTLS:
> 
> https://tools.ietf.org/html/draft-ietf-uta-tls-bcp-11
> 
> These are the default available ciphersuites in Firefox 36.0:
> 
> C02B  TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
> C02F  TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
> C00A  TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
> C009  TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
> C013  TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
> C014  TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
> 0033  TLS_DHE_RSA_WITH_AES_128_CBC_SHA
> 0032  TLS_DHE_DSS_WITH_AES_128_CBC_SHA
> 0039  TLS_DHE_RSA_WITH_AES_256_CBC_SHA
> 002F  TLS_RSA_WITH_AES_128_CBC_SHA
> 0035  TLS_RSA_WITH_AES_256_CBC_SHA
> 000A  TLS_RSA_WITH_3DES_EDE_CBC_SHA
> 
> I propose removal of the following ciphersuite:
> 
> 0032  TLS_DHE_DSS_WITH_AES_128_CBC_SHA
> 
> because DSS (the non-EC version) is obsolete, and based on preliminary
> telemetry and Pulse data is not being negotiated at all with any servers
> out there. My testing indicates that there are no public nor private
> servers that would support only this ciphersuit - please provide some data
> if you think otherwise.
> 
> I also propose removing the following ciphersuit:
> 
> 000A  TLS_RSA_WITH_3DES_EDE_CBC_SHA
> 
> because 3DES is a cipher that requires too much computing power compared to
> AES, much more computer memory, lacks hardware acceleration on servers, is
> rarely negotiated, has had its bitstrenght reduced below 128bits, and its
> removal is on track with avoiding (and eventually removing) RSA key
> exchange. Additionally, the servers that support (or even prefer!) 3DES
> always support some AES ciphersuit too.

Not true. In Alexa top 1 million I found at least 439 servers which support 
only 3DES and have valid certificates. If Firefox removes RC4, I'm sure that 
this will make this number effectively only larger (80% of servers still 
support RC4, 15% prefer RC4 over any and all ciphers).
 
-- 
Regards,
Hubert Kario
Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic

Attachment: signature.asc
Description: This is a digitally signed message part.

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to