-
Enhancement
-
Resolution: Fixed
-
P4
-
None
-
b16
Per RFC 7525, implementations SHOULD NOT negotiate cipher suites that use algorithms offering less than 128 bits of security. The strength of 3DES is 112 bits, which is less than 128 bits of security.
Cipher suites using 3DES are already disabled by default via the jdk.tls.disabledAlgorithms security property. This change would go one step further and not make them available by default, even if removed from the jdk.tls.disabledAlgorithms security property.
Cipher suites using 3DES are already disabled by default via the jdk.tls.disabledAlgorithms security property. This change would go one step further and not make them available by default, even if removed from the jdk.tls.disabledAlgorithms security property.
- csr for
-
JDK-8283450 Remove 3DES from the default enabled cipher suites list
- Closed
- relates to
-
JDK-8165712 Grant permission to read specific properties instead of all to the jdk.crypto.ucrypto module
- Resolved
1.
|
Release Note: TLS Cipher Suites Using 3DES Removed From the Default Enabled List | Resolved | Unassigned |