Open qwertychouskie opened 1 year ago
Related : #882, #858, #636, #602…
Interesting that NGINX doesn't allow that... Apache absolutely does. In reality, (usually) nothing bad happens if you "break" an RFC, assuming you test thoroughly to ensure you're not losing any compatibility. I've had TLS_AES_128_GCM_SHA256 disabled in Apache on multiple servers for years and it has caused zero problems or compatibility issues.
They're Requests For Comments not actual laws and they aren't necessarily kept up-to-date with current security practices.
Sometimes it's a choice between security and RFC-compliance and the correct answer is usually "it depends"
The bit on nginx is quite outdated as setting them is definitively possible now using ssl_conf_command Ciphersuites TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256;
for instance.
even if nginx doesnt allow it (which was the case when i looked into it) you can just configure it in your openssl.cnf
nginx configuration for disabling 128 bit ciphers:
ssl_conf_command Ciphersuites TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256;
credits: https://dustri.org/b/disabling-128-bits-ciphers-on-tls13-on-nginx.html
As per https://serverfault.com/a/1033444:
Either this limitation should be documented somewhere, or an exception should be added for
TLS_AES_128_GCM_SHA256
to not lower the score.