This makes total sense, thanks!
Ultimately I want to enable as many ciphers as possible as this machine is
being used to test a new TLS forensic tool, so the server security isn't an
issue to consider in configuration.
ST
> On Nov 4, 2015, at 4:01 PM, Viktor Dukhovni
> wrote:
>
>> On Wed, N
On Thu, Nov 05, 2015 at 12:06:53AM +, Matt Caswell wrote:
> > Only ciphers found in the "DEFAULT" cipherlist that are compatible
> > with your server certificate algorithm will be enabled in your
> > server.
>
> Note that in this case an explicit cipher string of TLSv1.2 has been
> set. This
On 05/11/15 00:01, Viktor Dukhovni wrote:
> On Wed, Nov 04, 2015 at 03:53:27PM -0800, Steve Topletz wrote:
>
>> I find that I'm missing many ciphers when I interrogate my openssl service.
>>
>> Running v1.0.2d 'openssl s_server -cert my.cer -key my.key -accept 443
>> -cipher TLSv1.2' offers only
On 04/11/15 23:53, Steve Topletz wrote:
> I find that I'm missing many ciphers when I interrogate my openssl service.
>
> Running v1.0.2d 'openssl s_server -cert my.cer -key my.key -accept 443
> -cipher TLSv1.2' offers only about 1/3 of the ciphers listed in 'openssl
> ciphers -V TLSv1.2'.
>
On Wed, Nov 04, 2015 at 03:53:27PM -0800, Steve Topletz wrote:
> I find that I'm missing many ciphers when I interrogate my openssl service.
>
> Running v1.0.2d 'openssl s_server -cert my.cer -key my.key -accept 443
> -cipher TLSv1.2' offers only about 1/3 of the ciphers listed in 'openssl
> ciph
I find that I'm missing many ciphers when I interrogate my openssl service.
Running v1.0.2d 'openssl s_server -cert my.cer -key my.key -accept 443 -cipher
TLSv1.2' offers only about 1/3 of the ciphers listed in 'openssl ciphers -V
TLSv1.2'.
How do I get the rest of these ciphers enabled?
ST