The following is a list of ciphers, how to know which ciphers are vulnerable to LogJam attack?
Client shared list of ciphers:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
- TLS_RSA_WITH_AES_128_CBC_SHA
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA
- TLS_DHE_DSS_WITH_AES_128_CBC_SHA
- TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
- TLS_RSA_WITH_3DES_EDE_CBC_SHA
- TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
- TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
- TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
- TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
- TLS_ECDHE_RSA_WITH_RC4_128_SHA
- TLS_RSA_WITH_RC4_128_SHA
- TLS_ECDH_ECDSA_WITH_RC4_128_SHA
- TLS_ECDH_RSA_WITH_RC4_128_SHA
- TLS_RSA_WITH_RC4_128_MD5
- TLS_EMPTY_RENEGOTIATION_INFO_SCSV
Server chosen cipher: TLS_RSA_WITH_AES_128_CBC_SHA
_DSS_(it's not supported these days anyway), don't use_RC4_(it's broken and deprecated), don't use_ECDH_(nobody supports it anyway, but still, ECDHE is what you want). You've not listed AEAD (AES-GCM) cipher suites, these are the only ones that are considered secure. Add them. Reorder the list to be: ECDHE+ECDSA+AESGCM, ECDHE+aRSA+AESGCM, DHE+aRSA+AESGCM, ECDHE+ECDSA+AES, ECDHE+aRSA+AES, DHE+aRSA+AES, RSA+AES, RSA+3DES. The first three are secure, the next 3 at least provide PFS, the last 2 are for compatibility. DHE is really secure only if you use at least 2048 bit DHE. – Z.T. Jun 09 '15 at 19:19