mirror of https://github.com/nodejs/node.git
tls: add DHE-RSA-AES128-SHA256 to the def ciphers
`!EDH` is also removed from the list in the discussion of #8272 Reviewed-By: Fedor Indutny <fedor@indutny.com>pull/23396/head
parent
0dfedb7127
commit
f6877f37b2
|
@ -142,14 +142,16 @@ automatically set as a listener for the [secureConnection][] event. The
|
||||||
conjunction with the `honorCipherOrder` option described below to
|
conjunction with the `honorCipherOrder` option described below to
|
||||||
prioritize the non-CBC cipher.
|
prioritize the non-CBC cipher.
|
||||||
|
|
||||||
Defaults to `ECDHE-RSA-AES128-SHA256:AES128-GCM-SHA256:RC4:HIGH:!MD5:!aNULL:!EDH`.
|
Defaults to
|
||||||
Consult the [OpenSSL cipher list format documentation] for details on the
|
`ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:AES128-GCM-SHA256:RC4:HIGH:!MD5:!aNULL`.
|
||||||
format.
|
Consult the [OpenSSL cipher list format documentation] for details
|
||||||
|
on the format.
|
||||||
|
|
||||||
`ECDHE-RSA-AES128-SHA256` and `AES128-GCM-SHA256` are TLS v1.2 ciphers and
|
`ECDHE-RSA-AES128-SHA256`, `DHE-RSA-AES128-SHA256` and
|
||||||
used when node.js is linked against OpenSSL 1.0.1 or newer, such as the
|
`AES128-GCM-SHA256` are TLS v1.2 ciphers and used when node.js is
|
||||||
bundled version of OpenSSL. Note that it is still possible for a TLS v1.2
|
linked against OpenSSL 1.0.1 or newer, such as the bundled version
|
||||||
client to negotiate a weaker cipher unless `honorCipherOrder` is enabled.
|
of OpenSSL. Note that it is still possible for a TLS v1.2 client
|
||||||
|
to negotiate a weaker cipher unless `honorCipherOrder` is enabled.
|
||||||
|
|
||||||
`RC4` is used as a fallback for clients that speak on older version of
|
`RC4` is used as a fallback for clients that speak on older version of
|
||||||
the TLS protocol. `RC4` has in recent years come under suspicion and
|
the TLS protocol. `RC4` has in recent years come under suspicion and
|
||||||
|
|
|
@ -33,8 +33,10 @@ exports.CLIENT_RENEG_WINDOW = 600;
|
||||||
exports.SLAB_BUFFER_SIZE = 10 * 1024 * 1024;
|
exports.SLAB_BUFFER_SIZE = 10 * 1024 * 1024;
|
||||||
|
|
||||||
exports.DEFAULT_CIPHERS =
|
exports.DEFAULT_CIPHERS =
|
||||||
'ECDHE-RSA-AES128-SHA256:AES128-GCM-SHA256:' + // TLS 1.2
|
// TLS 1.2
|
||||||
'RC4:HIGH:!MD5:!aNULL:!EDH'; // TLS 1.0
|
'ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:AES128-GCM-SHA256:' +
|
||||||
|
// TLS 1.0
|
||||||
|
'RC4:HIGH:!MD5:!aNULL';
|
||||||
|
|
||||||
exports.DEFAULT_ECDH_CURVE = 'prime256v1';
|
exports.DEFAULT_ECDH_CURVE = 'prime256v1';
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue