@Kurt: Thanks for the information
Is there a reason why you disable GCM? I can see no good reason to disable
it. It really is what you want in the first place.
--It was a user requirement and hence had to be disabled.
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla
Hi,
I found some new behavior with openldap server built against Mozilla
NSS(3.15.3) and our requirement is to use only TLSv1.2 ciphers only.
If I have following LDAP (Server+Client)configuration:
Scenario 1:
Openldap Server built against NSS(slap.conf) Openldap client
built a
Hi,
Thanks for the information.
I checked the ciphers supported by openldap server and got following
list(slapd.conf : TLSCipherSuite TLSv1.2):
==> openssl ciphers -v 'TLSv1.2'
ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD
ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2
3 matches
Mail list logo