I guess it’s a matter of personal preference, but a lot of time I hear things that I think are kind of a overreaction. People who think AES256 is really broken in practice, that sort of things…
Hi i already explained in the 100% thread that there is an big discussion between AES 128/256.
And yes suche.org it definitely not as secure as A+ 4*100% would tell, because with an trick
i managed to support also clients that would eliminate 100% since they use TLSv1.
But the hint with SHA1 and FF is good
If you look at the result you will see that the cipher suite report only list AES236 or CHACHA with TLSv1.2.
But if you look at the client information you will see that there are also TLSv1 connections and AES128.
You can see it under https://www.ssllabs.com/ssltest/analyze.html?d=suche.org
This i call an trick.
as far as I can think it’s the clientHello.
before the server gives away any info (serverhello) the client gives away his, along with data about itself and @tlussnig uses that data to see if it’s an IE for example and chooses the ciphers that are “available” from that.
to anyone who doesnt know.
Cloudflare allegedly proposed those so called "legacy verified" certificates which could use SHA1 but only for older clients.
to quote:
We propose a new Legacy Verified (LV) certificate. These certificates
would allow legacy signature protocols, such as SHA-1, and only be
issued to organizations that can confirm they properly only issue certs
based on modern protocols to modern browsers while falling back for
legacy browsers.
Finally, the organizations that provide SHA-1 fallback support should
commit that if a vulnerability is discovered which allows some form of
downgrade attack — where a modern browser can be tricked into receiving a
certificate signed with an insecure protocol — and the vulnerability
cannot be patched then they will withdraw fallback support. The CA/B
Forum should make this a requirement of an organization being issued LV
certificates.
CloudFlare has worked to ensure that we can continue to responsibly
provide SHA-1 support for all our paid customers even after the new
year. We believe this is critical for ensuring that we don't cut off the
world's most vulnerable populations from access to encrypted content
online. If you’re not a CloudFlare customer and you are worried about
supporting legacy browsers, make sure you get yourself a SHA-1
certificate before the end of the year. After that, unless our proposal
for LV certificates is adopted, if you want to enable encryption for all
Internet users it will be too late.
Maybe interesting the chrome dev introduce an new curve (29)
So i found that there are some new defined:
case 29: return("ecdh_x25519"); // https://tlswg.github.io/tls13-spec/
case 30: return("ecdh_x448"); // https://tlswg.github.io/tls13-spec/
case 31: return("eddsa_ed25519"); // (Signature Only) https://tlswg.github.io/tls13-spec/
case 32: return("eddsa_ed448"); // (Signature Only) https://tlswg.github.io/tls13-spec/
case 256: return("ffdhe2048"); // (Finite Field Groups) https://tlswg.github.io/tls13-spec/
case 257: return("ffdhe3072"); // (Finite Field Groups) https://tlswg.github.io/tls13-spec/
case 258: return("ffdhe4096"); // (Finite Field Groups) https://tlswg.github.io/tls13-spec/
case 259: return("ffdhe6144"); // (Finite Field Groups) https://tlswg.github.io/tls13-spec/
case 260: return("ffdhe8192"); // (Finite Field Groups) https://tlswg.github.io/tls13-spec/
Hi Osiris, it is from my client hello analysis. After i found an new unknown elliptical curve in my logs i could assign it to chrome. After that i verified that it is from chrome canary. Then i searched for curve type 29 (0x001D). And i found
an thread discussing ED25519 inclusion in chrome. After that i found https://tlswg.github.io/tls13-spec/ but sadly
i did not found the chrome source the inclusion.