[tor-talk] time to disable 3DES?

grarpamp grarpamp at gmail.com
Mon Oct 7 20:49:35 UTC 2013


On Mon, Oct 7, 2013 at 3:58 PM, Lee <ler762 at gmail.com> wrote:
> Isn't it time to quit using DES?
>
> Finally gave TBB a try (version 2.3.25-13), seems to me that the
> firefox component needs a lot of hardening.
>
> https://www.mikestoolbox.org/

This may be a function of the crypto library on your box (if dynamic),
rather than the supplied firefox itself (which it would be if static).
I don't have TBB handy.

printf 'GET / HTTP/1.0\n\n' \
 | openssl_101e s_client -connect www.mikestoolbox.org:https -ign_eof
 DHE-RSA-AES256-SHA256

0.9.8x: DHE-RSA-AES256-SHA

And that particular toolbox doesn't seem to support certain suites, ie:
ECDHE-RSA-AES256-GCM-SHA384: handshake failure

> Client Cipher Suites:

3DES is probably not least of note as all posted were SHA1 or lesser.


More information about the tor-talk mailing list