You are here

Hotfix HF4218 - TLS/SSL ciphersuite fix for Airlock Version prior 4.2.6.3

Affects version(s): 
4.2.6
4.2.6.1
4.2.6.2

Installation of version 4.2.6.3 obsoletes this hotfix and makes ciphersuites using ECDHE available on Airlock 4.2.

Description of the hotfix HF4218 ciphersuite

Each row describes the sub-ciphersuites separated by colons in the full ciphersuite. The prioritization goes from high (prio 1) to low. Note that ECDHE (elliptic-curve) ciphers are not included here because they are not supported prior to Airlock 4.2.6.3/5.0.

PrioSub-ciphersuiteCiphersForward
Secrecy
BEAST
resistant
Non-RC4LUCKY13
resistant
Handshake
simulation
1EDH+AESGCMDHE-RSA-AES256-GCM-SHA384 
DHE-RSA-AES128-GCM-SHA256
 

Resistant to all major known weaknesses.
Not (yet) supported by major clients.
May have a small negative performance impact on the SSL handshake (Diffie-Hellman protocol without elliptic-curves)
2EDH+AES

DHE-RSA-AES256-SHA256
DHE-RSA-AES128-SHA256

Opera 12.15 
Opera 16
Safari 6 
Safari 7 
Chrome 30

Many current clients will negotiate the 256 bit cipher version here.
Ciphers only affected by LUCKY13 attack, which is the least critical. 
3AESGCMAES256-GCM-SHA384
AES128-GCM-SHA256
 
 Does not provide Forward Secrecy but is resistant to all major known weaknesses.
4AESAES256-SHA256
AES128-SHA256
IE11/Win8
 IE11/Win8 falls back to this TLSv1.2 cipher because of the restrictions in Apache 2.2 (no ECDH).
ordering-SSLv3
     
 This statement removes all SSLv3 ciphers at this point. SSLv3 ciphers are added again in the next steps. This guarantees that TLSv1.2 ciphers are always prioritized over SSLv3 ciphers.
5EDH+AESDHE-RSA-AES256-SHA
DHE-RSA-AES128-SHA

Firefox 10.0.12 ESR 
Firefox 17.0.7 ESR
Safari 5.1.9 / OSX
Firefox 21 
Firefox 25
Java6u45
Java7u25

 These ciphers provide Forward Secrecy but could be vulnerable to BEAST. BEAST may be fixed on client-side with the 1/n-1 record splitting technique.
6EDH+3DESEDH-RSA-DES-CBC3-SHA 
 This cipher provides similar properties to 5) but with a weaker encryption scheme.
7AESAES256-SHA
AES128-SHA
IE8-10/Win7
IE7/Vista
 These ciphers could be vulnerable to BEAST. But BEAST is fixed on client-side with the 1/n-1 record splitting technique in modern browsers.
8RC4RC4-SHAIE6/XP
IE8/XP
 Clients here are still resistant to BEAST but must live with the RC4 weaknesses.
93DESDES-CBC3-SHA 
 Clients which fallback to this cipher are probably very old and most likely BEAST is not fixed on client side. We therefore put this cipher behind RC4.
exclude 1!ADHanonymous Diffie-Hellmann Key Exchange     
exclude   2!ECDHall elliptic curve key exchange and authentication ciphers because they are not supported in Apache httpd 2.2     
exclude   3
!DSS:authentication ciphers based on DSS certificates      
exclude   4
!MD5:ciphersuites using MD5     
exclude   5
!PSK:pre-shared key cipher suites      
exclude   6
!eNULL:NULL encryption ciphers     
exclude   7
!aNULL:NULL authentication ciphers      
exclude   8
!SRPsecure remote password ciphers      
exclude 9!EXPexport encryption algorithms. Including 40 and 56 bits algorithms
exclude 10DESciphersuites using DES (not triple DES)
Knowledge Base Categories: