Encryption SchemesThe term SSL covers a number of encryption schemes which may be implemented by both the server and the client. If the server and client can agree on a scheme, then the conversation goes ahead.
You can test for the schemes supported by your server using the SSLScan tool.
You can download a Windows version of SSLScan from
http://code.google.com/p/sslscan-win/.
A good source for SSLScan documentation is here
http://www.titania.co.uk/index.php?option=com_content&view=article&id=56&Itemid=68.
The two tests I recommend running are;
sslscan --no-failed localhost:443Where localhost and 443 are the server, and port numbers respectively.
This test shows all the Ciphers supported by your server.
For a list of all the ciphers that SSLScan will test, along with the result, use
sslscan localhost:443While it may be useful in some cases to support weak, or medium level ciphers, or in other cases to support SSLv2, from NetTalk version 5.06 (December 2010) the default cipher level will be SSLv3 or TLSv1 High level ciphers only. Specifically;
Supported Server Cipher(s):
Accepted SSLv3 256 bits AES256-SHA
Accepted SSLv3 128 bits AES128-SHA
Accepted SSLv3 168 bits DES-CBC3-SHA
Accepted TLSv1 256 bits AES256-SHA
Accepted TLSv1 128 bits AES128-SHA
Accepted TLSv1 168 bits DES-CBC3-SHA
Rather than make this an option, it makes sense from a security point of view to turn this on by default.
Should you encounter a situation where a weaker cipher is required, please contact CapeSoft.