[openssl-users] Diffie-Hellman Questions
Viktor Dukhovni
openssl-users at dukhovni.org
Wed May 25 20:58:36 UTC 2016
On Tue, May 24, 2016 at 05:45:56PM +0000, Salz, Rich wrote:
> > >./openssl ciphers -v 'ALL:aNULL' |grep ECDH |grep "Au=None"
> > AECDH-AES256-SHA SSLv3 Kx=ECDH Au=None Enc=AES(256) Mac=SHA1
> > AECDH-AES128-SHA SSLv3 Kx=ECDH Au=None Enc=AES(128) Mac=SHA1
> > AECDH-RC4-SHA SSLv3 Kx=ECDH Au=None Enc=RC4(128) Mac=SHA1
> > AECDH-DES-CBC3-SHA SSLv3 Kx=ECDH Au=None Enc=3DES(168) Mac=SHA1
> > AECDH-NULL-SHA SSLv3 Kx=ECDH Au=None Enc=None Mac=SHA1
> >
> > 1) What arg to SSL_CTX_set_cipher_list() to I need to use to get these?
> > I previously tried "kEECDH:kEDH" and that didn't work.
>
> Use one of the names in the first column.
No. To avoid overly-specific settings:
# To insist on anon ciphersuites:
OpenSSL 1.0.x: ALL+aNULL
OpenSSL 1.1.x: ALL+aNULL:@SECLEVEL=0
# To prefer anon ciphersuites:
OpenSSL 1.0.x: aNULL:-aNULL:ALL
OpenSSL 1.1.x: aNULL:-aNULL:ALL:@SECLEVEL=0
# To tolerate anon ciphersuites without explicit preference:
OpenSSL 1.0.x: ALL
OpenSSL 1.1.x: ALL:@SECLEVEL=0
In OpenSSL 1.1.0 I wanted to implement @AUTHLEVEL, to support
@SECLEVEL=1 for ciphers, while allowing anon auth, but that did
not make it into the code early enough:
ssl/ssl_cert.c:
/*
* XXX: Separate @AUTHSECLEVEL and @TLSSECLEVEL would be useful at some
* point, for now a single @SECLEVEL sets the same policy for TLS crypto
* and PKI authentication.
*/
X509_VERIFY_PARAM_set_auth_level(param, SSL_get_security_level(s));
That is perhaps still technically possible for 1.1.0, but almost
certainly too late, it is not a bug fix, and we're near the final
release. I'd like to add that for the next release.
--
Viktor.
More information about the openssl-users
mailing list