On Sun, Jan 08, 2023 at 04:33:08AM -0600, Matthew McGehrin wrote:

> The majority of the CBC_SHA ciphers are considered weak and should be 
> replaced with stronger ciphers.

Are considered weak for use in browsers when either the server or client
does not support the "Encrypt then MAC" (EtM) TLS extension.  They are
in fact more robust that AES GCM in most applications (no reliance on
fragile nonce-reuse avoidance), the performance advantage of GCM is
not significant in SMTP.

> See also:
> 
> https://www.tenable.com/plugins/nessus/159543
> 
> Recommended ciphers would be:

Recommended is to not waste time tweaking the cipherlists, with
opportunistic security this is not infrequently counterproductive.

-- 
    Viktor.

Reply via email to