diff options
author | Hubert Kario <hkario@redhat.com> | 2014-06-06 15:23:19 +0200 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2014-06-10 21:53:07 +0200 |
commit | 343e5cf194b7baf244ed24efa4b8e6d9fc5d4921 (patch) | |
tree | 0400a63b369319a37320a7147c898b99729a49af /doc | |
parent | Create test/testutil.h for unit test helper macros (diff) | |
download | openssl-343e5cf194b7baf244ed24efa4b8e6d9fc5d4921.tar.xz openssl-343e5cf194b7baf244ed24efa4b8e6d9fc5d4921.zip |
add ECC strings to ciphers(1), point out difference between DH and ECDH
* Make a clear distinction between DH and ECDH key exchange.
* Group all key exchange cipher suite identifiers, first DH then ECDH
* add descriptions for all supported *DH* identifiers
* add ECDSA authentication descriptions
* add example showing how to disable all suites that offer no
authentication or encryption
Diffstat (limited to 'doc')
-rw-r--r-- | doc/apps/ciphers.pod | 76 |
1 files changed, 60 insertions, 16 deletions
diff --git a/doc/apps/ciphers.pod b/doc/apps/ciphers.pod index ca839af56a..153e891015 100644 --- a/doc/apps/ciphers.pod +++ b/doc/apps/ciphers.pod @@ -132,8 +132,8 @@ specified. =item B<COMPLEMENTOFDEFAULT> the ciphers included in B<ALL>, but not enabled by default. Currently -this is B<ADH>. Note that this rule does not cover B<eNULL>, which is -not included by B<ALL> (use B<COMPLEMENTOFALL> if necessary). +this is B<ADH> and B<AECDH>. Note that this rule does not cover B<eNULL>, +which is not included by B<ALL> (use B<COMPLEMENTOFALL> if necessary). =item B<ALL> @@ -182,22 +182,59 @@ included. =item B<aNULL> the cipher suites offering no authentication. This is currently the anonymous -DH algorithms. These cipher suites are vulnerable to a "man in the middle" -attack and so their use is normally discouraged. +DH algorithms and anonymous ECDH algorithms. These cipher suites are vulnerable +to a "man in the middle" attack and so their use is normally discouraged. =item B<kRSA>, B<aRSA>, B<RSA> cipher suites using RSA key exchange, authentication or either respectively. -=item B<kDHE> - -cipher suites using ephemeral DH key agreement. - =item B<kDHr>, B<kDHd>, B<kDH> cipher suites using DH key agreement and DH certificates signed by CAs with RSA and DSS keys or either respectively. +=item B<kDHE>, B<kEDH> + +cipher suites using ephemeral DH key agreement, including anonymous cipher +suites. + +=item B<DHE>, B<EDH> + +cipher suites using authenticated ephemeral DH key agreement. + +=item B<ADH> + +anonymous DH cipher suites, note that this does not include anonymous Elliptic +Curve DH (ECDH) cipher suites. + +=item B<DH> + +cipher suites using DH, including anonymous DH, ephemeral DH and fixed DH. + +=item B<kECDHr>, B<kECDHe>, B<kECDH> + +cipher suites using fixed ECDH key agreement signed by CAs with RSA and ECDSA +keys or either respectively. + +=item B<kEECDH>, B<kECDHE> + +cipher suites using ephemeral ECDH key agreement, including anonymous +cipher suites. + +=item B<ECDHE>, B<EECDHE> + +cipher suites using authenticated ephemeral ECDH key agreement. + +=item B<AECDH> + +anonymous Elliptic Curve Diffie Hellman cipher suites. + +=item B<ECDH> + +cipher suites using ECDH key exchange, including anonymous, ephemeral and +fixed ECDH. + =item B<aDSS>, B<DSS> cipher suites using DSS authentication, i.e. the certificates carry DSS keys. @@ -207,6 +244,16 @@ cipher suites using DSS authentication, i.e. the certificates carry DSS keys. cipher suites effectively using DH authentication, i.e. the certificates carry DH keys. +=item B<aECDH> + +cipher suites effectively using ECDH authentication, i.e. the certificates +carry ECDH keys. + +=item B<aECDSA>, B<ECDSA> + +cipher suites using ECDSA authentication, i.e. the certificates carry ECDSA +keys. + =item B<kFZA>, B<aFZA>, B<eFZA>, B<FZA> ciphers suites using FORTEZZA key exchange, authentication, encryption or all @@ -217,14 +264,6 @@ FORTEZZA algorithms. Not implemented. TLS v1.2, TLS v1.0, SSL v3.0 or SSL v2.0 cipher suites respectively. Note: there are no ciphersuites specific to TLS v1.1. -=item B<DH> - -cipher suites using DH, including anonymous DH, ephemeral DH and fixed DH. - -=item B<ADH> - -anonymous DH cipher suites. - =item B<AES128>, B<AES256>, B<AES> cipher suites using 128 bit AES, 256 bit AES or either 128 or 256 bit AES. @@ -582,6 +621,11 @@ strength: openssl ciphers -v 'ALL:!ADH:@STRENGTH' +Include all ciphers except ones with no encryption (eNULL) or no +authentication (aNULL): + + openssl ciphers -v 'ALL:!aNULL' + Include only 3DES ciphers and then place RSA ciphers last: openssl ciphers -v '3DES:+RSA' |