Closed
Bug 1141985
Opened 10 years ago
Closed 10 years ago
*.tu-berlin.de is RC4 only
Categories
(Web Compatibility :: Site Reports, defect)
Tracking
(Not tracked)
RESOLVED
FIXED
People
(Reporter: ttaubert, Unassigned)
References
()
Details
bash-4.3$ ./cipherscan www.tu-berlin.de
...
Target: www.tu-berlin.de:443
prio ciphersuite protocols pfs_keysize
1 RC4-MD5 TLSv1
2 RC4-SHA TLSv1
Certificate: trusted, 2048 bit, sha256WithRSAEncryption signature
TLS ticket lifetime hint: None
OCSP stapling: not supported
Server side cipher ordering
Comment 1•10 years ago
|
||
In addition, https://www.ssllabs.com/ssltest/analyze.html?d=tu-berlin.de :
> TLS version intolerance TLS 1.1 TLS 1.2 TLS 1.3 TLS 1.98 TLS 2.98
This might be a good candidate for the wildcard list, based on the absurd amount of SAN entries in the cert.
Blocks: TLS-Intolerance
Comment 2•10 years ago
|
||
This one is actually tolerant when the record version is 0x0301.
Comment 3•10 years ago
|
||
(In reply to Yuhong Bao from comment #2)
> This one is actually tolerant when the record version is 0x0301.
Hmm, indeed. Thanks!
No longer blocks: TLS-Intolerance
Comment 4•10 years ago
|
||
Fixed. Now the site got A+!
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → FIXED
Assignee | ||
Updated•6 years ago
|
Product: Tech Evangelism → Web Compatibility
You need to log in
before you can comment on or make changes to this bug.
Description
•