SSL Cipher Suite Order recommended

wei liu 86 Reputation points
2024-11-11T04:36:15.59+00:00

Good day,

Could you give advice what the SSL Cipher Suite Order recommended at windows server 2019?

In the GPP default, I could saw the preset by default is below:

+++++

TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_128_GCM_SHA256

+++++

Brgds

Liu Wei

Windows for business | Windows Server | User experience | Other
0 comments No comments
{count} votes

Accepted answer
  1. Marcin Policht 49,715 Reputation points MVP Volunteer Moderator
    2024-11-11T05:18:03.5166667+00:00

    Ultimately, this is about finding the optimal balance between security and compatibility. Recommendation steer towards the former - but the environment you operate in might force you to consider the latter.

    In general though:

    1. Prioritize Stronger Cipher Suites:
    • Prefer ECDHE (Elliptic Curve Diffie-Hellman Ephemeral) key exchange algorithms. These provide forward secrecy, meaning that even if an attacker later compromises the server's private key, past communications cannot be decrypted.
    • Prioritize AES GCM (Galois/Counter Mode) over CBC (Cipher Block Chaining) due to better security properties (e.g., resistance to padding oracle attacks).
    • Avoid RSA-based cipher suites unless absolutely necessary, as these are considered less secure compared to ECDHE-based suites.
    1. Avoid Legacy Ciphers:
      • TLS 1.0 and TLS 1.1 are outdated and considered insecure.
      • Disable weak hash algorithms such as SHA1. Prefer SHA256 or stronger.

    For example, your list might look like this:

    TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,
    TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
    TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
    TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_128_GCM_SHA256
    

    Beyond that:

    • Disable Weak Ciphers: Specifically, you should disable the following ciphers:
    • Ciphers with SHA1 or weaker hashes (e.g., TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, etc.).
      • RC4-based ciphers (e.g., TLS_RSA_WITH_RC4_128_SHA).
      • 3DES ciphers (e.g., TLS_RSA_WITH_3DES_EDE_CBC_SHA).
    • Disable SSL 2.0 and SSL 3.0: These older protocols are insecure and should be disabled in favor of TLS 1.2 or 1.3.
    • Use Server Name Indication (SNI): To ensure secure connections and enable the use of multiple certificates on the same IP address, ensure that SNI is enabled.

    If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.

    hth

    Marcin

    0 comments No comments

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.