Blame SOURCES/openssl-1.0.1e-doc-ciphersuites.patch

83c29f
From 87887a7a658bf305bfe6619eedcbc6c3972cc188 Mon Sep 17 00:00:00 2001
83c29f
From: Hubert Kario <hkario@redhat.com>
83c29f
Date: Tue, 10 Jun 2014 14:13:33 +0200
83c29f
Subject: [PATCH] backport changes to ciphers(1) man page
83c29f
83c29f
Backport of the patch:
83c29f
add ECC strings to ciphers(1), point out difference between DH and ECDH
83c29f
and few other changes applicable to the 1.0.1 code base.
83c29f
83c29f
 * Make a clear distinction between DH and ECDH key exchange.
83c29f
 * Group all key exchange cipher suite identifiers, first DH then ECDH
83c29f
 * add descriptions for all supported *DH* identifiers
83c29f
 * add ECDSA authentication descriptions
83c29f
 * add example showing how to disable all suites that offer no
83c29f
   authentication or encryption
83c29f
 * backport listing of elliptic curve cipher suites.
83c29f
 * backport listing of TLS 1.2 cipher suites, add note that DH_RSA
83c29f
   and DH_DSS is not implemented in this version
83c29f
 * backport of description of PSK and listing of PSK cipher suites
83c29f
 * backport description of AES128, AES256 and AESGCM options
83c29f
 * backport description of CAMELLIA128, CAMELLIA256 options
83c29f
---
83c29f
 doc/apps/ciphers.pod |  195 ++++++++++++++++++++++++++++++++++++++++++++------
83c29f
 1 file changed, 173 insertions(+), 22 deletions(-)
83c29f
83c29f
diff --git a/doc/apps/ciphers.pod b/doc/apps/ciphers.pod
83c29f
index f44aa00..6086d0a 100644
83c29f
--- a/doc/apps/ciphers.pod
83c29f
+++ b/doc/apps/ciphers.pod
83c29f
@@ -36,7 +36,7 @@ SSL v2 and for SSL v3/TLS v1.
83c29f
 
83c29f
 =item B<-V>
83c29f
 
83c29f
-Like B<-V>, but include cipher suite codes in output (hex format).
83c29f
+Like B<-v>, but include cipher suite codes in output (hex format).
83c29f
 
83c29f
 =item B<-ssl3>
83c29f
 
83c29f
@@ -116,8 +116,8 @@ specified.
83c29f
 =item B<COMPLEMENTOFDEFAULT>
83c29f
 
83c29f
 the ciphers included in B<ALL>, but not enabled by default. Currently
83c29f
-this is B<ADH>. Note that this rule does not cover B<eNULL>, which is
83c29f
-not included by B<ALL> (use B<COMPLEMENTOFALL> if necessary).
83c29f
+this is B<ADH> and B<AECDH>. Note that this rule does not cover B<eNULL>,
83c29f
+which is not included by B<ALL> (use B<COMPLEMENTOFALL> if necessary).
83c29f
 
83c29f
 =item B<ALL>
83c29f
 
83c29f
@@ -165,21 +165,58 @@ included.
83c29f
 =item B<aNULL>
83c29f
 
83c29f
 the cipher suites offering no authentication. This is currently the anonymous
83c29f
-DH algorithms. These cipher suites are vulnerable to a "man in the middle"
83c29f
-attack and so their use is normally discouraged.
83c29f
+DH algorithms and anonymous ECDH algorithms. These cipher suites are vulnerable
83c29f
+to a "man in the middle" attack and so their use is normally discouraged.
83c29f
 
83c29f
 =item B<kRSA>, B<RSA>
83c29f
 
83c29f
 cipher suites using RSA key exchange.
83c29f
 
83c29f
+=item B<kDHr>, B<kDHd>, B<kDH>
83c29f
+
83c29f
+cipher suites using DH key agreement and DH certificates signed by CAs with RSA
83c29f
+and DSS keys or either respectively. Not implemented.
83c29f
+
83c29f
 =item B<kEDH>
83c29f
 
83c29f
-cipher suites using ephemeral DH key agreement.
83c29f
+cipher suites using ephemeral DH key agreement, including anonymous cipher
83c29f
+suites.
83c29f
 
83c29f
-=item B<kDHr>, B<kDHd>
83c29f
+=item B<EDH>
83c29f
 
83c29f
-cipher suites using DH key agreement and DH certificates signed by CAs with RSA
83c29f
-and DSS keys respectively. Not implemented.
83c29f
+cipher suites using authenticated ephemeral DH key agreement.
83c29f
+
83c29f
+=item B<ADH>
83c29f
+
83c29f
+anonymous DH cipher suites, note that this does not include anonymous Elliptic
83c29f
+Curve DH (ECDH) cipher suites.
83c29f
+
83c29f
+=item B<DH>
83c29f
+
83c29f
+cipher suites using DH, including anonymous DH, ephemeral DH and fixed DH.
83c29f
+
83c29f
+=item B<kECDHr>, B<kECDHe>, B<kECDH>
83c29f
+
83c29f
+cipher suites using fixed ECDH key agreement signed by CAs with RSA and ECDSA
83c29f
+keys or either respectively.
83c29f
+
83c29f
+=item B<kEECDH>
83c29f
+
83c29f
+cipher suites using ephemeral ECDH key agreement, including anonymous
83c29f
+cipher suites.
83c29f
+
83c29f
+=item B<EECDHE>
83c29f
+
83c29f
+cipher suites using authenticated ephemeral ECDH key agreement.
83c29f
+
83c29f
+=item B<AECDH>
83c29f
+
83c29f
+anonymous Elliptic Curve Diffie Hellman cipher suites.
83c29f
+
83c29f
+=item B<ECDH>
83c29f
+
83c29f
+cipher suites using ECDH key exchange, including anonymous, ephemeral and
83c29f
+fixed ECDH.
83c29f
 
83c29f
 =item B<aRSA>
83c29f
 
83c29f
@@ -194,30 +231,39 @@ cipher suites using DSS authentication, i.e. the certificates carry DSS keys.
83c29f
 cipher suites effectively using DH authentication, i.e. the certificates carry
83c29f
 DH keys.  Not implemented.
83c29f
 
83c29f
+=item B<aECDH>
83c29f
+
83c29f
+cipher suites effectively using ECDH authentication, i.e. the certificates
83c29f
+carry ECDH keys.
83c29f
+
83c29f
+=item B<aECDSA>, B<ECDSA>
83c29f
+
83c29f
+cipher suites using ECDSA authentication, i.e. the certificates carry ECDSA
83c29f
+keys.
83c29f
+
83c29f
 =item B<kFZA>, B<aFZA>, B<eFZA>, B<FZA>
83c29f
 
83c29f
 ciphers suites using FORTEZZA key exchange, authentication, encryption or all
83c29f
 FORTEZZA algorithms. Not implemented.
83c29f
 
83c29f
-=item B<TLSv1>, B<SSLv3>, B<SSLv2>
83c29f
-
83c29f
-TLS v1.0, SSL v3.0 or SSL v2.0 cipher suites respectively.
83c29f
+=item B<TLSv1.2>, B<TLSv1>, B<SSLv3>, B<SSLv2>
83c29f
 
83c29f
-=item B<DH>
83c29f
-
83c29f
-cipher suites using DH, including anonymous DH.
83c29f
+TLS v1.2, TLS v1.0, SSL v3.0 or SSL v2.0 cipher suites respectively. Note:
83c29f
+there are no ciphersuites specific to TLS v1.1.
83c29f
 
83c29f
-=item B<ADH>
83c29f
+=item B<AES128>, B<AES256>, B<AES>
83c29f
 
83c29f
-anonymous DH cipher suites.
83c29f
+cipher suites using 128 bit AES, 256 bit AES or either 128 or 256 bit AES.
83c29f
 
83c29f
-=item B<AES>
83c29f
+=item B<AESGCM>
83c29f
 
83c29f
-cipher suites using AES.
83c29f
+AES in Galois Counter Mode (GCM): these ciphersuites are only supported
83c29f
+in TLS v1.2.
83c29f
 
83c29f
-=item B<CAMELLIA>
83c29f
+=item B<CAMELLIA128>, B<CAMELLIA256>, B<CAMELLIA>
83c29f
 
83c29f
-cipher suites using Camellia.
83c29f
+cipher suites using 128 bit CAMELLIA, 256 bit CAMELLIA or either 128 or 256 bit
83c29f
+CAMELLIA.
83c29f
 
83c29f
 =item B<3DES>
83c29f
 
83c29f
@@ -251,6 +297,10 @@ cipher suites using MD5.
83c29f
 
83c29f
 cipher suites using SHA1.
83c29f
 
83c29f
+=item B<SHA256>, B<SHA384>
83c29f
+
83c29f
+ciphersuites using SHA256 or SHA384.
83c29f
+
83c29f
 =item B<aGOST> 
83c29f
 
83c29f
 cipher suites using GOST R 34.10 (either 2001 or 94) for authenticaction
83c29f
@@ -277,6 +327,9 @@ cipher suites, using HMAC based on GOST R 34.11-94.
83c29f
 
83c29f
 cipher suites using GOST 28147-89 MAC B<instead of> HMAC.
83c29f
 
83c29f
+=item B<PSK>
83c29f
+
83c29f
+cipher suites using pre-shared keys (PSK).
83c29f
 
83c29f
 =back
83c29f
 
83c29f
@@ -423,7 +476,100 @@ Note: these ciphers can also be used in SSL v3.
83c29f
  TLS_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA  EXP1024-DHE-DSS-RC4-SHA
83c29f
  TLS_DHE_DSS_WITH_RC4_128_SHA            DHE-DSS-RC4-SHA
83c29f
 
83c29f
-=head2 SSL v2.0 cipher suites.
83c29f
+=head2 Elliptic curve cipher suites.
83c29f
+
83c29f
+ TLS_ECDH_RSA_WITH_NULL_SHA              ECDH-RSA-NULL-SHA
83c29f
+ TLS_ECDH_RSA_WITH_RC4_128_SHA           ECDH-RSA-RC4-SHA
83c29f
+ TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA      ECDH-RSA-DES-CBC3-SHA
83c29f
+ TLS_ECDH_RSA_WITH_AES_128_CBC_SHA       ECDH-RSA-AES128-SHA
83c29f
+ TLS_ECDH_RSA_WITH_AES_256_CBC_SHA       ECDH-RSA-AES256-SHA
83c29f
+
83c29f
+ TLS_ECDH_ECDSA_WITH_NULL_SHA            ECDH-ECDSA-NULL-SHA
83c29f
+ TLS_ECDH_ECDSA_WITH_RC4_128_SHA         ECDH-ECDSA-RC4-SHA
83c29f
+ TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA    ECDH-ECDSA-DES-CBC3-SHA
83c29f
+ TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA     ECDH-ECDSA-AES128-SHA
83c29f
+ TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA     ECDH-ECDSA-AES256-SHA
83c29f
+
83c29f
+ TLS_ECDHE_RSA_WITH_NULL_SHA             ECDHE-RSA-NULL-SHA
83c29f
+ TLS_ECDHE_RSA_WITH_RC4_128_SHA          ECDHE-RSA-RC4-SHA
83c29f
+ TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA     ECDHE-RSA-DES-CBC3-SHA
83c29f
+ TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA      ECDHE-RSA-AES128-SHA
83c29f
+ TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA      ECDHE-RSA-AES256-SHA
83c29f
+
83c29f
+ TLS_ECDHE_ECDSA_WITH_NULL_SHA           ECDHE-ECDSA-NULL-SHA
83c29f
+ TLS_ECDHE_ECDSA_WITH_RC4_128_SHA        ECDHE-ECDSA-RC4-SHA
83c29f
+ TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA   ECDHE-ECDSA-DES-CBC3-SHA
83c29f
+ TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA    ECDHE-ECDSA-AES128-SHA
83c29f
+ TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA    ECDHE-ECDSA-AES256-SHA
83c29f
+
83c29f
+ TLS_ECDH_anon_WITH_NULL_SHA             AECDH-NULL-SHA
83c29f
+ TLS_ECDH_anon_WITH_RC4_128_SHA          AECDH-RC4-SHA
83c29f
+ TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA     AECDH-DES-CBC3-SHA
83c29f
+ TLS_ECDH_anon_WITH_AES_128_CBC_SHA      AECDH-AES128-SHA
83c29f
+ TLS_ECDH_anon_WITH_AES_256_CBC_SHA      AECDH-AES256-SHA
83c29f
+
83c29f
+=head2 TLS v1.2 cipher suites
83c29f
+
83c29f
+ TLS_RSA_WITH_NULL_SHA256                  NULL-SHA256
83c29f
+
83c29f
+ TLS_RSA_WITH_AES_128_CBC_SHA256           AES128-SHA256
83c29f
+ TLS_RSA_WITH_AES_256_CBC_SHA256           AES256-SHA256
83c29f
+ TLS_RSA_WITH_AES_128_GCM_SHA256           AES128-GCM-SHA256
83c29f
+ TLS_RSA_WITH_AES_256_GCM_SHA384           AES256-GCM-SHA384
83c29f
+
83c29f
+ TLS_DH_RSA_WITH_AES_128_CBC_SHA256        Not implemented.
83c29f
+ TLS_DH_RSA_WITH_AES_256_CBC_SHA256        Not implemented.
83c29f
+ TLS_DH_RSA_WITH_AES_128_GCM_SHA256        Not implemented.
83c29f
+ TLS_DH_RSA_WITH_AES_256_GCM_SHA384        Not implemented.
83c29f
+
83c29f
+ TLS_DH_DSS_WITH_AES_128_CBC_SHA256        Not implemented.
83c29f
+ TLS_DH_DSS_WITH_AES_256_CBC_SHA256        Not implemented.
83c29f
+ TLS_DH_DSS_WITH_AES_128_GCM_SHA256        Not implemented.
83c29f
+ TLS_DH_DSS_WITH_AES_256_GCM_SHA384        Not implemented.
83c29f
+
83c29f
+ TLS_DHE_RSA_WITH_AES_128_CBC_SHA256       DHE-RSA-AES128-SHA256
83c29f
+ TLS_DHE_RSA_WITH_AES_256_CBC_SHA256       DHE-RSA-AES256-SHA256
83c29f
+ TLS_DHE_RSA_WITH_AES_128_GCM_SHA256       DHE-RSA-AES128-GCM-SHA256
83c29f
+ TLS_DHE_RSA_WITH_AES_256_GCM_SHA384       DHE-RSA-AES256-GCM-SHA384
83c29f
+
83c29f
+ TLS_DHE_DSS_WITH_AES_128_CBC_SHA256       DHE-DSS-AES128-SHA256
83c29f
+ TLS_DHE_DSS_WITH_AES_256_CBC_SHA256       DHE-DSS-AES256-SHA256
83c29f
+ TLS_DHE_DSS_WITH_AES_128_GCM_SHA256       DHE-DSS-AES128-GCM-SHA256
83c29f
+ TLS_DHE_DSS_WITH_AES_256_GCM_SHA384       DHE-DSS-AES256-GCM-SHA384
83c29f
+
83c29f
+ TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256      ECDH-RSA-AES128-SHA256
83c29f
+ TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384      ECDH-RSA-AES256-SHA384
83c29f
+ TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256      ECDH-RSA-AES128-GCM-SHA256
83c29f
+ TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384      ECDH-RSA-AES256-GCM-SHA384
83c29f
+
83c29f
+ TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256    ECDH-ECDSA-AES128-SHA256
83c29f
+ TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384    ECDH-ECDSA-AES256-SHA384
83c29f
+ TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256    ECDH-ECDSA-AES128-GCM-SHA256
83c29f
+ TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384    ECDH-ECDSA-AES256-GCM-SHA384
83c29f
+
83c29f
+ TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256     ECDHE-RSA-AES128-SHA256
83c29f
+ TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384     ECDHE-RSA-AES256-SHA384
83c29f
+ TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256     ECDHE-RSA-AES128-GCM-SHA256
83c29f
+ TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384     ECDHE-RSA-AES256-GCM-SHA384
83c29f
+
83c29f
+ TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256   ECDHE-ECDSA-AES128-SHA256
83c29f
+ TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384   ECDHE-ECDSA-AES256-SHA384
83c29f
+ TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256   ECDHE-ECDSA-AES128-GCM-SHA256
83c29f
+ TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384   ECDHE-ECDSA-AES256-GCM-SHA384
83c29f
+
83c29f
+ TLS_DH_anon_WITH_AES_128_CBC_SHA256       ADH-AES128-SHA256
83c29f
+ TLS_DH_anon_WITH_AES_256_CBC_SHA256       ADH-AES256-SHA256
83c29f
+ TLS_DH_anon_WITH_AES_128_GCM_SHA256       ADH-AES128-GCM-SHA256
83c29f
+ TLS_DH_anon_WITH_AES_256_GCM_SHA384       ADH-AES256-GCM-SHA384
83c29f
+
83c29f
+=head2 Pre shared keying (PSK) cipheruites
83c29f
+
83c29f
+ TLS_PSK_WITH_RC4_128_SHA                  PSK-RC4-SHA
83c29f
+ TLS_PSK_WITH_3DES_EDE_CBC_SHA             PSK-3DES-EDE-CBC-SHA
83c29f
+ TLS_PSK_WITH_AES_128_CBC_SHA              PSK-AES128-CBC-SHA
83c29f
+ TLS_PSK_WITH_AES_256_CBC_SHA              PSK-AES256-CBC-SHA
83c29f
+
83c29f
+=head2 Deprecated SSL v2.0 cipher suites.
83c29f
 
83c29f
  SSL_CK_RC4_128_WITH_MD5                 RC4-MD5
83c29f
  SSL_CK_RC4_128_EXPORT40_WITH_MD5        EXP-RC4-MD5
83c29f
@@ -452,6 +598,11 @@ strength:
83c29f
 
83c29f
  openssl ciphers -v 'ALL:!ADH:@STRENGTH'
83c29f
 
83c29f
+Include all ciphers except ones with no encryption (eNULL) or no
83c29f
+authentication (aNULL):
83c29f
+
83c29f
+ openssl ciphers -v 'ALL:!aNULL'
83c29f
+
83c29f
 Include only 3DES ciphers and then place RSA ciphers last:
83c29f
 
83c29f
  openssl ciphers -v '3DES:+RSA'
83c29f
-- 
83c29f
1.7.9.5
83c29f