Closed Bug 1141985 Opened 10 years ago Closed 10 years ago

*.tu-berlin.de is RC4 only

Categories

(Web Compatibility :: Site Reports, defect)

Firefox 38
defect
Not set
normal

Tracking

(Not tracked)

RESOLVED FIXED

People

(Reporter: ttaubert, Unassigned)

References

()

Details

bash-4.3$ ./cipherscan www.tu-berlin.de ... Target: www.tu-berlin.de:443 prio ciphersuite protocols pfs_keysize 1 RC4-MD5 TLSv1 2 RC4-SHA TLSv1 Certificate: trusted, 2048 bit, sha256WithRSAEncryption signature TLS ticket lifetime hint: None OCSP stapling: not supported Server side cipher ordering
In addition, https://www.ssllabs.com/ssltest/analyze.html?d=tu-berlin.de : > TLS version intolerance TLS 1.1 TLS 1.2 TLS 1.3 TLS 1.98 TLS 2.98 This might be a good candidate for the wildcard list, based on the absurd amount of SAN entries in the cert.
This one is actually tolerant when the record version is 0x0301.
(In reply to Yuhong Bao from comment #2) > This one is actually tolerant when the record version is 0x0301. Hmm, indeed. Thanks!
No longer blocks: TLS-Intolerance
Fixed. Now the site got A+!
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → FIXED
Product: Tech Evangelism → Web Compatibility
You need to log in before you can comment on or make changes to this bug.