Blame SOURCES/README.legacy-settings

557317
Guide for legacy support enablement
557317
===================================
557317
557317
To improve security provided by use of OpenSSL especially in context of
557317
TLS connections we regularly review and deprecate algorithms and algorithm
557317
settings which are no longer viewed as secure.
557317
557317
For some of these deprecated algorithms we provide a way for the
557317
system administrator to reenable them.
557317
557317
Deprecated algorithms, protocols and settings in OpenSSL
557317
========================================================
557317
557317
Previous Red Hat Enterprise Linux 7 update releases:
557317
557317
* SSL2 protocol disabled by default.
557317
* Minimum DH group size accepted by SSL/TLS client 768 bits.
557317
* Verification of certificates and signatures using MD5 hash
557317
  disabled.
557317
557317
Red Hat Enterprise Linux 7.4:
557317
557317
* SSL2 protocol support completely disabled (cannot be re-enabled).
557317
* All SSL/TLS export ciphers disabled.
557317
* All SSL/TLS ciphersuites with keys smaller than 128 bits disabled.
557317
* Minimum DH group size accepted by SSL/TLS client 1024 bits.
557317
* Disabled support for verification of certificates and signatures
557317
  using MD2, MD4, MD5, and SHA0 hashes.
557317
557317
Legacy support enablement
557317
=========================
557317
557317
The OpenSSL now supports /etc/pki/tls/legacy-settings configuration file
557317
which can be created by the system administrator which contains lines with
557317
simple Key Value pairs.
557317
557317
The library recognizes the following possible configuration settings in
557317
that file:
557317
557317
LegacySigningMDs md2 md5
557317
MinimumDHBits 512
557317
557317
The LegacySigningMDs option allows reenabling support for verification of
557317
signatures with the specified hash algorithms. These can be any combination
557317
of md2, md4, md5 and sha. (sha represents SHA0 algorithm, not SHA1.) Any
557317
unrecognized algorithms are ignored.
557317
557317
The MinimumDHBits option allows setting of the minimum bit size of DH group
557317
accepted by SSL/TLS client. It can be any value between 512 and 10000.
557317
557317
If the configuration file is not present the built-in defaults (that is the
557317
secure defaults) are used. Any unrecognized lines (with other parameter
557317
names or comments) are ignored.