> These cipher suites do not preserve forward-secrecy and are not commonly > used. Other TLS implementations (ex: Rustls) do not support or enable these > suites by default. RFC 9325 [1] states that these suites should not be used. > The IETF Draft "Deprecating Obsolete Key Exchange Methods in TLS" [2] > mandates that these suites not be used. > > Some TLS_RSA_* cipher suites are already disabled because they use DES, 3DES, > RC4, or NULL, which are disabled. This action will disable all remaining > TLS_RSA cipher suites. > > [1] RFC 9325, Recommendations for Secure Use of TLS and DTLS > (https://www.rfc-editor.org/rfc/rfc9325.html#section-4.1-2.5.1): > "Implementations SHOULD NOT negotiate cipher suites based on RSA key > transport, a.k.a. "static RSA". Rationale: These cipher suites, which have > assigned values starting with the string "TLS_RSA_WITH_*", have several > drawbacks, especially the fact that they do not support forward secrecy." > [2] IETF Draft, Deprecating Obsolete Key Exchange Methods in TLS > (https://www.ietf.org/archive/id/draft-ietf-tls-deprecate-obsolete-kex-05.html#section-4): > "Clients MUST NOT offer and servers MUST NOT select RSA cipher suites in TLS > 1.2 connections. (Note that TLS 1.0 and 1.1 are deprecated by [RFC8996], and > TLS 1.3 does not support static RSA [RFC8446].)"
Artur Barashev has updated the pull request incrementally with one additional commit since the last revision: Revert DTLSMFLNTest. Revert imports. Add comments. ------------- Changes: - all: https://git.openjdk.org/jdk/pull/22163/files - new: https://git.openjdk.org/jdk/pull/22163/files/d95c0449..a0280d6d Webrevs: - full: https://webrevs.openjdk.org/?repo=jdk&pr=22163&range=05 - incr: https://webrevs.openjdk.org/?repo=jdk&pr=22163&range=04-05 Stats: 13 lines in 10 files changed: 5 ins; 3 del; 5 mod Patch: https://git.openjdk.org/jdk/pull/22163.diff Fetch: git fetch https://git.openjdk.org/jdk.git pull/22163/head:pull/22163 PR: https://git.openjdk.org/jdk/pull/22163