@@ -141,14 +141,37 @@ automatically set as a listener for the [secureConnection][] event. The
141
141
- ` ciphers ` : A string describing the ciphers to use or exclude, seperated by
142
142
` : ` . The default cipher suite is:
143
143
144
- ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA256:
145
- DHE-RSA-AES256-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:
146
- HIGH:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!SRP:!CAMELLIA
147
-
148
- The default cipher suite prefers ECDHE and DHE ciphers for Perfect Forward
149
- secrecy, while offering * some* backward compatibiltity. Old clients which
150
- rely on insecure and deprecated RC4 or DES-based ciphers (like Internet
151
- Explorer 6) aren't able to complete the handshake with the default
144
+ ECDHE-RSA-AES128-GCM-SHA256:
145
+ ECDHE-ECDSA-AES128-GCM-SHA256:
146
+ ECDHE-RSA-AES256-GCM-SHA384:
147
+ ECDHE-ECDSA-AES256-GCM-SHA384:
148
+ DHE-RSA-AES128-GCM-SHA256:
149
+ ECDHE-RSA-AES128-SHA256:
150
+ DHE-RSA-AES128-SHA256:
151
+ ECDHE-RSA-AES256-SHA384:
152
+ DHE-RSA-AES256-SHA384:
153
+ ECDHE-RSA-AES256-SHA256:
154
+ DHE-RSA-AES256-SHA256:
155
+ HIGH:
156
+ !aNULL:
157
+ !eNULL:
158
+ !EXPORT:
159
+ !DES:
160
+ !RC4:
161
+ !MD5:
162
+ !PSK:
163
+ !SRP:
164
+ !CAMELLIA
165
+
166
+ The default cipher suite prefers GCM ciphers for [ Chrome's 'modern
167
+ cryptography' setting] and also prefers ECDHE and DHE ciphers for Perfect
168
+ Forward secrecy, while offering * some* backward compatibiltity.
169
+
170
+ 128 bit AES is preferred over 192 and 256 bit AES in light of [ specific
171
+ attacks affecting larger AES key sizes] .
172
+
173
+ Old clients that rely on insecure and deprecated RC4 or DES-based ciphers
174
+ (like Internet Explorer 6) aren't able to complete the handshake with the default
152
175
configuration. If you absolutely must support these clients, the
153
176
[ TLS recommendations] may offer a compatible cipher suite. For more details
154
177
on the format, see the [ OpenSSL cipher list format documentation] .
@@ -784,6 +807,8 @@ The string representation of the local IP address.
784
807
The numeric representation of the local port.
785
808
786
809
[ OpenSSL cipher list format documentation ] : http://www.openssl.org/docs/apps/ciphers.html#CIPHER_LIST_FORMAT
810
+ [ Chrome's 'modern cryptography' setting ] : http://www.chromium.org/Home/chromium-security/education/tls#TOC-Deprecation-of-TLS-Features-Algorithms-in-Chrome
811
+ [ specific attacks affecting larger AES key sizes ] : https://www.schneier.com/blog/archives/2009/07/another_new_aes.html
787
812
[ BEAST attacks ] : http://blog.ivanristic.com/2011/10/mitigating-the-beast-attack-on-tls.html
788
813
[ tls.createServer ] : #tls_tls_createserver_options_secureconnectionlistener
789
814
[ tls.createSecurePair ] : #tls_tls_createsecurepair_context_isserver_requestcert_rejectunauthorized
0 commit comments