On Sun, Jul 19, 2015 at 09:24:15PM +0200, DTNX Postmaster wrote:

>   * TLSV1 Cipher Suites:
>       Preferred:                       
>                  RC4-MD5              128 bits
>       Accepted:                        
>                  RC4-SHA              128 bits
>                  RC4-MD5              128 bits
>                  DES-CBC3-SHA         112 bits
>                  DES-CBC-SHA          56 bits
>                  EXP-RC4-MD5          40 bits
>                  EXP-RC2-CBC-MD5      40 bits
> ==
> 
> Out of those four, only one is more than one connection over those 90
> days. That one is in active use, a client for an important customer, and
> it looks like it'll do 'DES-CBC3-SHA' just fine if we disable RC4 for
> outgoing mail.

Sadly, in the same product the DES-CBD3-SHA implementation is
broken.  Once RC4 goes, you'll see post-handshake TLS failures.

> The other seven now have better defaults (one jumped to TLSv1.2 with cipher
> ECDHE-RSA-AES256-SHA384) or will negotiate an AES cipher of some kind if
> RC4 is disabled.

Overall though, if similar attrition is happening elsewhere, perhaps
no RC4 in 2016 is somewhat realistic...

> I suspect that the change to 'LOW' would not even be a blip on the radar
> for most deployments. Push that through, and add a note to the README,

Thanks for the feedback.

> YMMV, etcetera ... moar dataz plz!

Indeed it would be nice to have numbers from more sources.

-- 
        Viktor.

Reply via email to