Alexander Bluhm <alexander.bl...@gmx.net> writes:

> On Sun, Jan 29, 2017 at 07:51:38AM -0700, Kyle Amon wrote:
>> Ahem.  I still think it would be great if this could get applied
>> before yet another release goes by. ;)
>
> I have tested it.  The server cypher list changes from
>    * SSLv23    TLSv1_2   DHE-RSA-AES256-GCM-SHA384
>    * TLSv1_2   TLSv1_2   DHE-RSA-AES256-GCM-SHA384
>    * TLSv1_1   TLSv1_1   DHE-RSA-AES256-SHA
>    * TLSv1     TLSv1     DHE-RSA-AES256-SHA
> to
>    * SSLv23    TLSv1_2   ECDHE-RSA-AES256-GCM-SHA384
>    * TLSv1_2   TLSv1_2   ECDHE-RSA-AES256-GCM-SHA384
>    * TLSv1_1   TLSv1_1   ECDHE-RSA-AES256-SHA
>    * TLSv1     TLSv1     ECDHE-RSA-AES256-SHA
>
> We also need a revision bump.
>
> ok?

I just want to stress that "FFR" means "For Future Releases".
Generally I don't think we should enable experimental features just
because we can, and I can't see why EC would be different here.

No objection though, my use case doesn't involve TLS.

-- 
jca | PGP : 0x1524E7EE / 5135 92C1 AD36 5293 2BDF  DDCC 0DFA 74AE 1524 E7EE

Reply via email to