Apps shouldn't let users enter OpenSSL cipher-suite strings

by jedisct1on 6/6/25, 8:06 AMwith 12 comments
by jsnider3on 6/10/25, 4:23 AM

I'm not going to take security advice from someone whose website I can't open in https.

by stop50on 6/6/25, 8:51 AM

Clientside apps: definitly not on Server side: i usually set an minimum tls version, The ciphers baseline of HIGH and removing some ciphers like sha1, CBC and any NULL Containing cipher

by dontdoxxmeon 6/10/25, 4:25 AM

https://web.archive.org/web/20250606081030/https://00f.net/2... given this seems to not accept (most?) TLS handshakes...

by tbrownawon 6/10/25, 4:38 AM

Site won't load so I can't see if it's advocating no choices or a different mechanism or granularity for choices.

But, say, itsec banning some tls1.2 "for compatibility reasons" options is less drastic than itsec just banning tls1.2 from the company network entirely.

by finnigjaon 6/10/25, 5:15 AM

ruh roh... "no secure protocols supported", per https://www.ssllabs.com/ssltest/analyze.html?d=00f.net

by userbinatoron 6/10/25, 4:09 AM

Yes they should. Enough with this authoritarian user-hostile attitude. I can't even connect to your site as you reject my ClientHello, and I'm not going to figure out why.

by rurbanon 6/10/25, 5:23 AM

That's how I implemented it. Just with less checkboxes.

by tatersolidon 6/10/25, 4:10 AM

“Safari can’t open the page because it couldn’t establish a secure connection to the server.”

Irony or satire?

by xenaon 6/10/25, 4:27 AM

Does not load in Firefox