It would be great to support AWS ELB policies. One challenge would be to automatically generate the policy based on the openssl ciphersuite. But if that's not possible, simply displaying a static policy would work.
"Policies":[
{
"PolicyName":"Mozilla-Opsec-Intermediate-2014-11-06",
"PolicyType":"SSLNegotiationPolicyType",
"Attributes":[
{"Name":"Protocol-TLSv1" , "Value":true },
{"Name":"Protocol-TLSv1.1" , "Value":true },
{"Name":"Protocol-TLSv1.2" , "Value":true },
{"Name":"Server-Defined-Cipher-Order" , "Value":true },
{"Name": "ECDHE-RSA-AES128-GCM-SHA256", "Value":true },
{"Name": "ECDHE-ECDSA-AES128-GCM-SHA256", "Value":true },
{"Name": "ECDHE-RSA-AES256-GCM-SHA384", "Value":true },
{"Name": "ECDHE-ECDSA-AES256-GCM-SHA384", "Value":true },
{"Name": "DHE-RSA-AES128-GCM-SHA256", "Value":true },
{"Name": "DHE-DSS-AES128-GCM-SHA256", "Value":true },
{"Name": "kEDH+AESGCM", "Value":true },
{"Name": "ECDHE-RSA-AES128-SHA256", "Value":true },
{"Name": "ECDHE-ECDSA-AES128-SHA256", "Value":true },
{"Name": "ECDHE-RSA-AES128-SHA", "Value":true },
{"Name": "ECDHE-ECDSA-AES128-SHA", "Value":true },
{"Name": "ECDHE-RSA-AES256-SHA384", "Value":true },
{"Name": "ECDHE-ECDSA-AES256-SHA384", "Value":true },
{"Name": "ECDHE-RSA-AES256-SHA", "Value":true },
{"Name": "ECDHE-ECDSA-AES256-SHA", "Value":true },
{"Name": "DHE-RSA-AES128-SHA256", "Value":true },
{"Name": "DHE-RSA-AES128-SHA", "Value":true },
{"Name": "DHE-DSS-AES128-SHA256", "Value":true },
{"Name": "DHE-RSA-AES256-SHA256", "Value":true },
{"Name": "DHE-DSS-AES256-SHA", "Value":true },
{"Name": "DHE-RSA-AES256-SHA", "Value":true },
{"Name": "AES128-GCM-SHA256", "Value":true },
{"Name": "AES256-GCM-SHA384", "Value":true },
{"Name": "AES128-SHA256", "Value":true },
{"Name": "AES256-SHA256", "Value":true },
{"Name": "AES128-SHA", "Value":true },
{"Name": "AES256-SHA", "Value":true },
{"Name": "AES", "Value":true },
{"Name": "CAMELLIA", "Value":true },
{"Name": "DES-CBC3-SHA", "Value":true }
]
}
]