cfec1a
Guide for legacy support enablement
cfec1a
===================================
cfec1a
cfec1a
To improve security provided by use of OpenSSL especially in context of
cfec1a
TLS connections we regularly review and deprecate algorithms and algorithm
cfec1a
settings which are no longer viewed as secure.
cfec1a
cfec1a
For some of these deprecated algorithms we provide a way for the
cfec1a
system administrator to reenable them.
cfec1a
cfec1a
Deprecated algorithms, protocols and settings in OpenSSL
cfec1a
========================================================
cfec1a
cfec1a
Previous Red Hat Enterprise Linux 7 update releases:
cfec1a
cfec1a
* SSL2 protocol disabled by default.
cfec1a
* Minimum DH group size accepted by SSL/TLS client 768 bits.
cfec1a
* Verification of certificates and signatures using MD5 hash
cfec1a
  disabled.
cfec1a
cfec1a
Red Hat Enterprise Linux 7.4:
cfec1a
cfec1a
* SSL2 protocol support completely disabled (cannot be re-enabled).
cfec1a
* All SSL/TLS export ciphers disabled.
cfec1a
* All SSL/TLS ciphersuites with keys smaller than 128 bits disabled.
cfec1a
* Minimum DH group size accepted by SSL/TLS client 1024 bits.
cfec1a
* Disabled support for verification of certificates and signatures
cfec1a
  using MD2, MD4, MD5, and SHA0 hashes.
cfec1a
cfec1a
Legacy support enablement
cfec1a
=========================
cfec1a
cfec1a
The OpenSSL now supports /etc/pki/tls/legacy-settings configuration file
cfec1a
which can be created by the system administrator which contains lines with
cfec1a
simple Key Value pairs.
cfec1a
cfec1a
The library recognizes the following possible configuration settings in
cfec1a
that file:
cfec1a
cfec1a
LegacySigningMDs md2 md5
cfec1a
MinimumDHBits 512
cfec1a
cfec1a
The LegacySigningMDs option allows reenabling support for verification of
cfec1a
signatures with the specified hash algorithms. These can be any combination
cfec1a
of md2, md4, md5 and sha. (sha represents SHA0 algorithm, not SHA1.) Any
cfec1a
unrecognized algorithms are ignored.
cfec1a
cfec1a
The MinimumDHBits option allows setting of the minimum bit size of DH group
cfec1a
accepted by SSL/TLS client. It can be any value between 512 and 10000.
cfec1a
cfec1a
If the configuration file is not present the built-in defaults (that is the
cfec1a
secure defaults) are used. Any unrecognized lines (with other parameter
cfec1a
names or comments) are ignored.