Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

3
  • The industry isn't making an effort to move from 128- to 256-bit AES on its own. They have to move to post-quantum ciphers eventually, but there's little reason to do it before deploying post-quantum key exchange algorithms, and that isn't going to happen soon. Commented Aug 11, 2016 at 21:39
  • Aria - I'm not entirely convinced by your reasoning, but the tip about using nmap to enumerate the installed cipher suites is very helpful. Commented Aug 11, 2016 at 22:43
  • It's dump from Fedora 24 Server, and I am pushing it like this to live systems and it's working just fine, so it's latest Redhat standard. Also, this Fedora uses OpenSSL 1.0.2h-fips so there's no ChaCha20-Poly1305 in it yet (it's in OpenSSL 1.1.0 which is still in beta). Commented Aug 11, 2016 at 23:03