sblantipodi wrote:
I don't understood, should I disable RC4 cipher?
If I disable it, what kind of problems may I have?
I would disable it, yes, it's no longer considered secure, nor really necessary for most clients. If you have a specific requirement to use it, you'd know it and decide how to justify it, but in the absence of that, I'd definitely disable it. It's actually been broken for a while, but stuck around longer than it should have as the lesser of two evils in some cases due to compatibility concerns or practicality of an exploit.
As Les indicated, disabling will block clients that need it, but most have alternatives. It used to be that disabling RC4 would affect a large swath of clients with no other option, but that's not as much of an issue any more. The Mozilla cipher list falls back to 3DES for the really old guys to help with the remaining compatibility, which is far slower, but at least permits the connections. But if such clients are a very large percentage of your connections, that could be a consideration.
Of course, the SSL Labs test isn't necessarily gospel, so if you have a reason for RC4, just accept the B from that specific test.
See also the "RC4 weaknesses" discussion on the Mozilla page, or comments on the SSL Labs site (I think the "capped" warning has a link). If not, enabling the cap was discussed in
https://community.qualys.com/blogs/secu ... ation-plan-- David