Ciphers for clients
|
Ciphers for servers
|
AES128-SHA256
|
AES128-SHA256
|
DHE-RSA-AES128-SHA256
|
DHE-RSA-AES128-SHA256
|
AES128-GCM-SHA256
|
AES128-GCM-SHA256
|
DHE-RSA-AES128-GCM-SHA256
|
DHE-RSA-AES128-GCM-SHA256
|
ADH-AES128-SHA256
|
AES256-SHA256
|
ADH-AES256-SHA256
|
DHE-RSA-AES256-SHA256
|
ADH-AES128-GCM-SHA256
|
ADH-AES128-SHA256
|
AES256-SHA256
|
ADH-AES128-GCM-SHA256
|
DHE-RSA-AES256-SHA256
|
ADH-AES256-SHA256
|
AES256-GCM-SHA384
|
|
DHE-RSA-AES256-GCM-SHA384
|
|
ADH-AES256-GCM-SHA384
|
Protocols
|
Ciphers
|
Certificates
|
TLSv1.2
|
AES128-SHA256
DHE-RSA-AES128-SHA256
AES128-GCM-SHA256
DHE-RSA-AES128-GCM-SHA256
ADH-AES128-SHA256
ADH-AES128-GCM-SHA256
ADH-AES256-SHA256
AES256-SHA256
DHE-RSA-AES256-SHA256
|
Default server certificate is signed with SHA256 ($DLC/keys/default_server.pem). If you use your own certificates, make sure they are signed with SHA256.
|
TLSv1.2
|
AES256-GCM-SHA384
DHE-RSA-AES256-GCM-SHA384
ADH-AES256-GCM-SHA384
|
The default server certificate must be signed with SHA384.
Do the following for server certificates:
1. Take a backup of $DLC/keys/default_server.pem (that is signed with SHA256)
2. Rename $DLC/keys/test_server_SHA384.pem to $DLC/keys/default_server.pem.
|
TLSv1.1
TLSv1.0
SSLv3
|
AES128-SHA
RC4-SHA
DES-CBC3-SHA
DES-CBC-SHA
EXP-DES-CBC-SHA
|
The server certificates must be signed with SHA1. Do the following:
1. Take a backup of $DLC/keys/default_server.pem (that is singed with SHA256)
2. Rename $DLC/keys/test_server_SHA.pem file to $DLC/keys/default_server.pem.
|
Network library
|
Ciphers
|
JSSE
|
AES128-SHA256
DHE-RSA-AES128-SHA256
|
RSA
|
AES128-SHA256
AES256-SHA256
DHE-RSA-AES128-SHA256
AES128-GCM-SHA256
DHE-RSA-AES128-GCM-SHA256
DHE-RSA-AES256-SHA256
ADH-AES128-GCM-SHA256
ADH-AES256-SHA256
|