- From: Mary Ellen Zurko <mzurko@us.ibm.com>
- Date: Fri, 9 Apr 2010 10:13:34 -0400
- To: public-wsc-wg@w3.org
Received on Friday, 9 April 2010 14:12:23 UTC
Based on email discussions with Ian and Wan-Teh Chang, we're updating the Google Chrome implementation report as follows (was TBD). This will be part of the overall update to the draft implementation report I'll be uploading to the wiki shortly (as I have two other action items on it). What TLS [SSLv3][TLSv11][TLSv12] protocol versions and algorithms are considered as strong TLS algorithms, and what protocol versions and algorithms are supported in TLS negotiation, but not considered strong. On Linux, we enable only cipher suites with keys of at least 80 bits. On Windows, we share system wide SSL settings for supported cipher suites, and explicitly disable SSLv2 and MD2 and MD4 on certificate signatures. We don?t have anything we accept but consider ?weak?.
Received on Friday, 9 April 2010 14:12:23 UTC