Closed as not planned
Description
Hey,
I read #29349 and https://go.dev/blog/tls-cipher-suites carefully. It's clear that you don't want to support ordering in TLS 1.3 as all supported modes are secure enough. But what if that changes in the future?
To my understanding the AES based ciphers are preferred when HW acceleration supports that. What if a hw implementation is wrong or we just prefer Chacha20?
Overall what's the point of restricting the users' liberty here? I understand that it leaves room for misconfiguration usually to have more options, but here all current modes are secure enough according to your argument. So why would it open up possibilities for misconfig?
Thanks