From f0ceff4d9d8fad6363c8f3a925d73b4c993a8151 Mon Sep 17 00:00:00 2001 From: Aaron Kaplan Date: Tue, 7 Jan 2014 19:45:39 +0100 Subject: [PATCH] Re-enable SRP. Reasoning: 1) feedback on the mailing lists requested removal of "!SRP". 2) first of all, sysadmins need to configure SRP manually anyway. This means, disabling SRP in our cipher string will just lock it out anyway but not specifiying SRP will not disable it for an already configured SRP system 3) SRP seems to be a good protocol Relevant mailing list posts: http://lists.cert.at/pipermail/ach/2013-December/thread.html#616 --- src/cipherStringB.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/cipherStringB.txt b/src/cipherStringB.txt index 5437676..2380901 100644 --- a/src/cipherStringB.txt +++ b/src/cipherStringB.txt @@ -1 +1 @@ -EDH+CAMELLIA:EDH+aRSA:EECDH+aRSA+AESGCM:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH:+CAMELLIA256:+AES256:+CAMELLIA128:+AES128:+SSLv3:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!RC4:!SEED:!ECDSA:CAMELLIA256-SHA:AES256-SHA:CAMELLIA128-SHA:AES128-SHA +EDH+CAMELLIA:EDH+aRSA:EECDH+aRSA+AESGCM:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH:+CAMELLIA256:+AES256:+CAMELLIA128:+AES128:+SSLv3:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!DSS:!RC4:!SEED:!ECDSA:CAMELLIA256-SHA:AES256-SHA:CAMELLIA128-SHA:AES128-SHA -- 2.20.1