You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This might be more of two enhancements, however both related to one another, upon checking the current ssl-ciphers.conf file which shows that it uses the intermediate SSL configuration for nginx which contains weak ciphers, however for more secure environments or applications, it would be beneficial to provide a selector to allow what preference we prefer to use, i.e. modern or intermediate ssl configuration.
Alternatively being able to select or manually update the conf files from the UI to choose which ciphers are being provided on a per host level would resolve this individually.
For Example
If we can select which TLS v1.2 Ciphers are in use like the following image we reduce attack surface from using weak ciphers completely.
Instead of the current TLSv1.2 ciphers in the ssl-ciphers.conf which shows a number of weak ciphers.
I'm currently looking to manage the ciphers list manually to resolve this as a workaround based off of the #564
The text was updated successfully, but these errors were encountered:
This might be more of two enhancements, however both related to one another, upon checking the current ssl-ciphers.conf file which shows that it uses the intermediate SSL configuration for nginx which contains weak ciphers, however for more secure environments or applications, it would be beneficial to provide a selector to allow what preference we prefer to use, i.e. modern or intermediate ssl configuration.
Alternatively being able to select or manually update the conf files from the UI to choose which ciphers are being provided on a per host level would resolve this individually.
For Example

If we can select which TLS v1.2 Ciphers are in use like the following image we reduce attack surface from using weak ciphers completely.
Instead of the current TLSv1.2 ciphers in the ssl-ciphers.conf which shows a number of weak ciphers.

I'm currently looking to manage the ciphers list manually to resolve this as a workaround based off of the #564
The text was updated successfully, but these errors were encountered: