diff options
author | jsing <> | 2016-10-19 16:38:40 +0000 |
---|---|---|
committer | jsing <> | 2016-10-19 16:38:40 +0000 |
commit | 8acc30923121ec4884a8cb19e75bd99889131e7f (patch) | |
tree | 69cebce9957786fdcd7943948cd528b764891fb2 /src/lib/libssl/ssl_ciph.c | |
parent | ac7c37977891b32e21ccb19829cc10dc20c3d5ca (diff) | |
download | openbsd-8acc30923121ec4884a8cb19e75bd99889131e7f.tar.gz openbsd-8acc30923121ec4884a8cb19e75bd99889131e7f.tar.bz2 openbsd-8acc30923121ec4884a8cb19e75bd99889131e7f.zip |
Remove support for fixed ECDH cipher suites - these is not widely supported
and more importantly they do not provide PFS (if you want to use ECDH, use
ECDHE instead).
With input from guenther@.
ok deraadt@ guenther@
Diffstat (limited to 'src/lib/libssl/ssl_ciph.c')
-rw-r--r-- | src/lib/libssl/ssl_ciph.c | 32 |
1 files changed, 2 insertions, 30 deletions
diff --git a/src/lib/libssl/ssl_ciph.c b/src/lib/libssl/ssl_ciph.c index 526d98e293..2bf73c6606 100644 --- a/src/lib/libssl/ssl_ciph.c +++ b/src/lib/libssl/ssl_ciph.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_ciph.c,v 1.86 2016/04/28 16:39:45 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_ciph.c,v 1.87 2016/10/19 16:38:40 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -257,28 +257,14 @@ static const SSL_CIPHER cipher_aliases[] = { | |||
257 | .name = SSL_TXT_DH, | 257 | .name = SSL_TXT_DH, |
258 | .algorithm_mkey = SSL_kDHE, | 258 | .algorithm_mkey = SSL_kDHE, |
259 | }, | 259 | }, |
260 | |||
261 | { | ||
262 | .name = SSL_TXT_kECDHr, | ||
263 | .algorithm_mkey = SSL_kECDHr, | ||
264 | }, | ||
265 | { | ||
266 | .name = SSL_TXT_kECDHe, | ||
267 | .algorithm_mkey = SSL_kECDHe, | ||
268 | }, | ||
269 | { | ||
270 | .name = SSL_TXT_kECDH, | ||
271 | .algorithm_mkey = SSL_kECDHr|SSL_kECDHe, | ||
272 | }, | ||
273 | { | 260 | { |
274 | .name = SSL_TXT_kEECDH, | 261 | .name = SSL_TXT_kEECDH, |
275 | .algorithm_mkey = SSL_kECDHE, | 262 | .algorithm_mkey = SSL_kECDHE, |
276 | }, | 263 | }, |
277 | { | 264 | { |
278 | .name = SSL_TXT_ECDH, | 265 | .name = SSL_TXT_ECDH, |
279 | .algorithm_mkey = SSL_kECDHr|SSL_kECDHe|SSL_kECDHE, | 266 | .algorithm_mkey = SSL_kECDHE, |
280 | }, | 267 | }, |
281 | |||
282 | { | 268 | { |
283 | .name = SSL_TXT_kGOST, | 269 | .name = SSL_TXT_kGOST, |
284 | .algorithm_mkey = SSL_kGOST, | 270 | .algorithm_mkey = SSL_kGOST, |
@@ -302,10 +288,6 @@ static const SSL_CIPHER cipher_aliases[] = { | |||
302 | .algorithm_auth = SSL_aNULL, | 288 | .algorithm_auth = SSL_aNULL, |
303 | }, | 289 | }, |
304 | { | 290 | { |
305 | .name = SSL_TXT_aECDH, | ||
306 | .algorithm_auth = SSL_aECDH, | ||
307 | }, | ||
308 | { | ||
309 | .name = SSL_TXT_aECDSA, | 291 | .name = SSL_TXT_aECDSA, |
310 | .algorithm_auth = SSL_aECDSA, | 292 | .algorithm_auth = SSL_aECDSA, |
311 | }, | 293 | }, |
@@ -1455,7 +1437,6 @@ ssl_create_cipher_list(const SSL_METHOD *ssl_method, | |||
1455 | ssl_cipher_apply_rule(0, 0, SSL_aNULL, 0, 0, 0, 0, CIPHER_ORD, -1, &head, &tail); | 1437 | ssl_cipher_apply_rule(0, 0, SSL_aNULL, 0, 0, 0, 0, CIPHER_ORD, -1, &head, &tail); |
1456 | 1438 | ||
1457 | /* Move ciphers without forward secrecy to the end */ | 1439 | /* Move ciphers without forward secrecy to the end */ |
1458 | ssl_cipher_apply_rule(0, 0, SSL_aECDH, 0, 0, 0, 0, CIPHER_ORD, -1, &head, &tail); | ||
1459 | ssl_cipher_apply_rule(0, SSL_kRSA, 0, 0, 0, 0, 0, CIPHER_ORD, -1, &head, &tail); | 1440 | ssl_cipher_apply_rule(0, SSL_kRSA, 0, 0, 0, 0, 0, CIPHER_ORD, -1, &head, &tail); |
1460 | 1441 | ||
1461 | /* RC4 is sort of broken - move it to the end */ | 1442 | /* RC4 is sort of broken - move it to the end */ |
@@ -1597,12 +1578,6 @@ SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) | |||
1597 | case SSL_kDHE: | 1578 | case SSL_kDHE: |
1598 | kx = "DH"; | 1579 | kx = "DH"; |
1599 | break; | 1580 | break; |
1600 | case SSL_kECDHr: | ||
1601 | kx = "ECDH/RSA"; | ||
1602 | break; | ||
1603 | case SSL_kECDHe: | ||
1604 | kx = "ECDH/ECDSA"; | ||
1605 | break; | ||
1606 | case SSL_kECDHE: | 1581 | case SSL_kECDHE: |
1607 | kx = "ECDH"; | 1582 | kx = "ECDH"; |
1608 | break; | 1583 | break; |
@@ -1620,9 +1595,6 @@ SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) | |||
1620 | case SSL_aDSS: | 1595 | case SSL_aDSS: |
1621 | au = "DSS"; | 1596 | au = "DSS"; |
1622 | break; | 1597 | break; |
1623 | case SSL_aECDH: | ||
1624 | au = "ECDH"; | ||
1625 | break; | ||
1626 | case SSL_aNULL: | 1598 | case SSL_aNULL: |
1627 | au = "None"; | 1599 | au = "None"; |
1628 | break; | 1600 | break; |