Isn't it time to quit using DES? Finally gave TBB a try (version 2.3.25-13), seems to me that the firefox component needs a lot of hardening.
https://www.mikestoolbox.org/ Client Cipher Suites: C00A TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA C014 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 0088 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 0087 TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA 0039 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 0038 TLS_DHE_DSS_WITH_AES_256_CBC_SHA C00F TLS_ECDH_RSA_WITH_AES_256_CBC_SHA C005 TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA 0084 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 0035 TLS_RSA_WITH_AES_256_CBC_SHA C007 TLS_ECDHE_ECDSA_WITH_RC4_128_SHA C009 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA C011 TLS_ECDHE_RSA_WITH_RC4_128_SHA C013 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 0045 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 0044 TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA 0033 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 0032 TLS_DHE_DSS_WITH_AES_128_CBC_SHA C00C TLS_ECDH_RSA_WITH_RC4_128_SHA C00E TLS_ECDH_RSA_WITH_AES_128_CBC_SHA C002 TLS_ECDH_ECDSA_WITH_RC4_128_SHA C004 TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA 0096 TLS_RSA_WITH_SEED_CBC_SHA 0041 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 0005 TLS_RSA_WITH_RC4_128_SHA 0004 TLS_RSA_WITH_RC4_128_MD5 002F TLS_RSA_WITH_AES_128_CBC_SHA C008 TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA C012 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 0016 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 0013 TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA C00D TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA C003 TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA FEFF SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA 000A TLS_RSA_WITH_3DES_EDE_CBC_SHA Lee -- tor-talk mailing list - [email protected] To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
