[Bug 11456] wget TLS handshake failure (alert code 40)

bugzilla at busybox.net bugzilla at busybox.net
Wed Nov 7 21:30:56 UTC 2018


https://bugs.busybox.net/show_bug.cgi?id=11456

--- Comment #11 from Denys Vlasenko <vda.linux at googlemail.com> ---
(In reply to macmpi from comment #10)
>What are the specific ciphers that current Busybox TLS implementation supports? 

AES128 and 256, SHA1 and 256, certs with RSA public key

>Are some supposed to be mandatory baselines in TLS 1.2/1.3?

Well, the problem is, as weaknesses are found, weaker crypto setups gets
"discouraged" by newer RFCs and newer versions of software - even if these same
setups were deemed as "required to be supported" by initial RFCs. End result
is, some "required to be supported" things may well end up not being supported
by a significant fraction of servers.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


More information about the busybox-cvs mailing list