aeris22’s avataraeris22’s Twitter Archive—№ 34,171

        1. …in reply to @dusan_panic
          @dusan_panic @lanodan The **ONLY** secure config for TLS today is TLSv1.2 **only** and ECHDE+AESGCM **only**.
      1. …in reply to @aeris22
        @dusan_panic @lanodan TLSv1.2 only to close definitly padding error, ECHDE for PFS only and end of weak DHE, and GCM for CBC trouble end.
    1. …in reply to @aeris22
      @dusan_panic @lanodan (You can also use CHACHA20+POLY1305 if available.)
  1. …in reply to @aeris22
    @dusan_panic @lanodan All other cipher suite contains a potential vulnerability (no-PFS, 3DES, RC4, CBC cipher, TLS padding oracle, weak DH)