Je hebt een klacht over de onderstaande posting:
Door Anoniem: https://tools.ietf.org/html/rfc7525 Implementations SHOULD NOT negotiate TLS version 1.0 [RFC2246]; the only exception is when no higher version is available in the negotiation. - Rationale: TLS 1.0 (published in 1999) does not support many modern, strong cipher suites. In addition, TLS 1.0 lacks a per- record Initialization Vector (IV) for CBC-based cipher suites and does not warn against common padding errors. . . . Implementations MUST support TLS 1.2 [RFC5246] and MUST prefer to negotiate TLS version 1.2 over earlier versions of TLS. - Rationale: Several stronger cipher suites are available only with TLS 1.2 (published in 2008). In fact, the cipher suites recommended by this document (Section 4.2 below) are only available in TLS 1.2. Aha (en dank). Maar PCI security councel verkondigde: "...the only exception is when no higher version is available in the negotiation." Dus men faciliteert in feite het doordraaien op TLS1.0 als de software zich niet naar een hogere versie laat ...
Beschrijf je klacht (Optioneel):