I’ve run our site through the SSL Server Test at ssllabs.com. The overall rating is A, which is great (huge thanks to Let’s Encrypt for this.) Everything is basically “green” on the page, except the Cipher Suites sections that shows a number of weak suites. Now, suites priority has been set on the server side, so I’m not worry because these are at the very bottom at the list. However, should I be concern at all? If so, is there a way to get them all in the “green” zone? Or should I remove them?
In my opinion, it’s a reasonable choice. In my opinion, a different configuration – like Mozilla’s “modern compatibility” option – that reduces compatibility with old clients and increases security is also a reasonable choice.
As you said, the least good options are at the bottom of the list, so modern clients will always choose something better.
It’s your choice whether to stick with the default or change it to something else.
Editing the file should be safe. I think any changes will be preserved next time Certbot is upgraded, but I’m not 100% sure.
Future versions of Certbot may make these options more easily configurable.
The consequence of that, by the way, is that if you remove the weak ones, some browsers may no longer be able to connect to your site. SSL Labs can also show you the compatibility situation by simulating the behavior of those browsers.
As @mnordhoff has alluded to, the reason for this configuration involves Mozilla’s thinking about browser compatibility. Many sites continue to optionally support some older cryptographic technology because that’s necessary in order to support connections from older web browsers. That does not mean that newer web browsers will use these technologies when they connect to those sites.
Triple-DES has been considered weak by SSL Labs for a while due to the potential vulnerability to the SWEET32 attack.
It appears recently SSL Labs is now tagging RSA-only suites as weak too, however it currently does not impact the grade, as I still earn an A+. RSA-only suites are tagged weak because they lack Forward Secrecy.
SSL Labs also considers to be preferable DHE_RSA, ECDHE_RSA, and ECDHE_ECDSA (last one requires an EC certificate) with AEAD ciphers like AES_GCM and CHACHA20_POLY1305.