diff options
author | schwarze <> | 2018-04-10 22:07:30 +0000 |
---|---|---|
committer | schwarze <> | 2018-04-10 22:07:30 +0000 |
commit | 4a86db5884fb87b302e9846edd558538a0a73215 (patch) | |
tree | 8f0f95f7ad9951944433ace8c889cd454c1713fe /src | |
parent | ab5441dabf7863796dfb9a9fa4b4fc32a5330169 (diff) | |
download | openbsd-4a86db5884fb87b302e9846edd558538a0a73215.tar.gz openbsd-4a86db5884fb87b302e9846edd558538a0a73215.tar.bz2 openbsd-4a86db5884fb87b302e9846edd558538a0a73215.zip |
Delete the description of the argument of the "ciphers" command
because it was (1) woefully incomplete, (2) partially outdated
and wrong, (3) in parts imprecisely worded and hard to understand,
(4) excessively technical for a section 1 manual, (5) of excessive
size for this particular page, (6) and didn't belong here in the
first place because it essentially tried to document a C API -
SSL_CTX_set_cipher_list(3), which is now documented, so point to it.
Diffstat (limited to 'src')
-rw-r--r-- | src/usr.bin/openssl/openssl.1 | 158 |
1 files changed, 13 insertions, 145 deletions
diff --git a/src/usr.bin/openssl/openssl.1 b/src/usr.bin/openssl/openssl.1 index f371a8b178..39fdf8bb27 100644 --- a/src/usr.bin/openssl/openssl.1 +++ b/src/usr.bin/openssl/openssl.1 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: openssl.1,v 1.92 2018/03/31 12:46:12 schwarze Exp $ | 1 | .\" $OpenBSD: openssl.1,v 1.93 2018/04/10 22:07:30 schwarze Exp $ |
2 | .\" ==================================================================== | 2 | .\" ==================================================================== |
3 | .\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. | 3 | .\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. |
4 | .\" | 4 | .\" |
@@ -110,7 +110,7 @@ | |||
110 | .\" copied and put under another distribution licence | 110 | .\" copied and put under another distribution licence |
111 | .\" [including the GNU Public Licence.] | 111 | .\" [including the GNU Public Licence.] |
112 | .\" | 112 | .\" |
113 | .Dd $Mdocdate: March 31 2018 $ | 113 | .Dd $Mdocdate: April 10 2018 $ |
114 | .Dt OPENSSL 1 | 114 | .Dt OPENSSL 1 |
115 | .Os | 115 | .Os |
116 | .Sh NAME | 116 | .Sh NAME |
@@ -837,14 +837,20 @@ The same as | |||
837 | .Sh CIPHERS | 837 | .Sh CIPHERS |
838 | .Nm openssl ciphers | 838 | .Nm openssl ciphers |
839 | .Op Fl hVv | 839 | .Op Fl hVv |
840 | .Op Ar cipherlist | 840 | .Op Ar control |
841 | .Pp | 841 | .Pp |
842 | The | 842 | The |
843 | .Nm ciphers | 843 | .Nm ciphers |
844 | command converts | 844 | command converts the |
845 | .Nm openssl | 845 | .Ar control |
846 | cipher lists into ordered SSL cipher preference lists. | 846 | string from the format documented in |
847 | It can be used as a way to determine the appropriate cipher list. | 847 | .Xr SSL_CTX_set_cipher_list 3 |
848 | into an ordered SSL cipher suite preference list. | ||
849 | If no | ||
850 | .Ar control | ||
851 | string is specified, the | ||
852 | .Cm DEFAULT | ||
853 | list is printed. | ||
848 | .Pp | 854 | .Pp |
849 | The options are as follows: | 855 | The options are as follows: |
850 | .Bl -tag -width Ds | 856 | .Bl -tag -width Ds |
@@ -859,144 +865,6 @@ key exchange, authentication, encryption, and mac algorithms. | |||
859 | Like | 865 | Like |
860 | .Fl V , | 866 | .Fl V , |
861 | but without cipher suite codes. | 867 | but without cipher suite codes. |
862 | .It Ar cipherlist | ||
863 | A cipher list to convert to a cipher preference list. | ||
864 | If it is not included, the default cipher list will be used. | ||
865 | .Pp | ||
866 | The cipher list consists of one or more cipher strings | ||
867 | separated by colons. | ||
868 | Commas or spaces are also acceptable separators, but colons are normally used. | ||
869 | .Pp | ||
870 | The actual cipher string can take several different forms: | ||
871 | .Pp | ||
872 | It can consist of a single cipher suite, such as RC4-SHA. | ||
873 | .Pp | ||
874 | It can represent a list of cipher suites containing a certain algorithm, | ||
875 | or cipher suites of a certain type. | ||
876 | For example SHA1 represents all cipher suites using the digest algorithm SHA1. | ||
877 | .Pp | ||
878 | Lists of cipher suites can be combined in a single cipher string using the | ||
879 | .Sq + | ||
880 | character | ||
881 | (logical AND operation). | ||
882 | For example, SHA1+DES represents all cipher suites | ||
883 | containing the SHA1 and DES algorithms. | ||
884 | .Pp | ||
885 | Each cipher string can be optionally preceded by the characters | ||
886 | .Sq \&! , | ||
887 | .Sq - , | ||
888 | or | ||
889 | .Sq + . | ||
890 | If | ||
891 | .Sq !\& | ||
892 | is used, then the ciphers are permanently deleted from the list. | ||
893 | The ciphers deleted can never reappear in the list even if they are | ||
894 | explicitly stated. | ||
895 | If | ||
896 | .Sq - | ||
897 | is used, then the ciphers are deleted from the list, but some or | ||
898 | all of the ciphers can be added again by later options. | ||
899 | If | ||
900 | .Sq + | ||
901 | is used, then the ciphers are moved to the end of the list. | ||
902 | This option doesn't add any new ciphers, it just moves matching existing ones. | ||
903 | .Pp | ||
904 | If none of these characters is present, the string is just interpreted | ||
905 | as a list of ciphers to be appended to the current preference list. | ||
906 | If the list includes any ciphers already present, they will be ignored; | ||
907 | that is, they will not be moved to the end of the list. | ||
908 | .Pp | ||
909 | Additionally, the cipher string | ||
910 | .Cm @STRENGTH | ||
911 | can be used at any point to sort the current cipher list in order of | ||
912 | encryption algorithm key length. | ||
913 | .El | ||
914 | .Pp | ||
915 | The following is a list of all permitted cipher strings and their meanings. | ||
916 | .Bl -tag -width "XXXX" | ||
917 | .It Cm DEFAULT | ||
918 | The default cipher list. | ||
919 | This is determined at compile time and is currently | ||
920 | .Cm ALL:!aNULL:!eNULL:!SSLv2 . | ||
921 | This must be the first cipher string specified. | ||
922 | .It Cm COMPLEMENTOFDEFAULT | ||
923 | The ciphers included in | ||
924 | .Cm ALL , | ||
925 | but not enabled by default. | ||
926 | Currently this is | ||
927 | .Cm ADH . | ||
928 | Note that this rule does not cover | ||
929 | .Cm eNULL , | ||
930 | which is not included by | ||
931 | .Cm ALL | ||
932 | (use | ||
933 | .Cm COMPLEMENTOFALL | ||
934 | if necessary). | ||
935 | .It Cm ALL | ||
936 | All cipher suites except the | ||
937 | .Cm eNULL | ||
938 | ciphers, which must be explicitly enabled. | ||
939 | .It Cm COMPLEMENTOFALL | ||
940 | The cipher suites not enabled by | ||
941 | .Cm ALL , | ||
942 | currently being | ||
943 | .Cm eNULL . | ||
944 | .It Cm HIGH | ||
945 | .Qq High | ||
946 | encryption cipher suites. | ||
947 | This currently means those with key lengths larger than 128 bits. | ||
948 | .It Cm MEDIUM | ||
949 | .Qq Medium | ||
950 | encryption cipher suites, currently those using 128-bit encryption. | ||
951 | .It Cm LOW | ||
952 | .Qq Low | ||
953 | encryption cipher suites, currently those using 64- or 56-bit encryption | ||
954 | algorithms. | ||
955 | .It Cm eNULL , NULL | ||
956 | The | ||
957 | .Qq NULL | ||
958 | ciphers; that is, those offering no encryption. | ||
959 | Because these offer no encryption at all and are a security risk, | ||
960 | they are disabled unless explicitly included. | ||
961 | .It Cm aNULL | ||
962 | The cipher suites offering no authentication. | ||
963 | This is currently the anonymous DH algorithms. | ||
964 | These cipher suites are vulnerable to a | ||
965 | .Qq man in the middle | ||
966 | attack, so their use is normally discouraged. | ||
967 | .It Cm kRSA , RSA | ||
968 | Cipher suites using RSA key exchange. | ||
969 | .It Cm kEDH | ||
970 | Cipher suites using ephemeral DH key agreement. | ||
971 | .It Cm aRSA | ||
972 | Cipher suites using RSA authentication, i.e. the certificates carry RSA keys. | ||
973 | .It Cm aDSS , DSS | ||
974 | Cipher suites using DSS authentication, i.e. the certificates carry DSS keys. | ||
975 | .It Cm TLSv1 | ||
976 | TLS v1.0 cipher suites. | ||
977 | .It Cm DH | ||
978 | Cipher suites using DH, including anonymous DH. | ||
979 | .It Cm ADH | ||
980 | Anonymous DH cipher suites. | ||
981 | .It Cm AES | ||
982 | Cipher suites using AES. | ||
983 | .It Cm 3DES | ||
984 | Cipher suites using triple DES. | ||
985 | .It Cm DES | ||
986 | Cipher suites using DES | ||
987 | .Pq not triple DES . | ||
988 | .It Cm RC4 | ||
989 | Cipher suites using RC4. | ||
990 | .It Cm CAMELLIA | ||
991 | Cipher suites using Camellia. | ||
992 | .It Cm CHACHA20 | ||
993 | Cipher suites using ChaCha20. | ||
994 | .It Cm IDEA | ||
995 | Cipher suites using IDEA. | ||
996 | .It Cm MD5 | ||
997 | Cipher suites using MD5. | ||
998 | .It Cm SHA1 , SHA | ||
999 | Cipher suites using SHA1. | ||
1000 | .El | 868 | .El |
1001 | .Sh CRL | 869 | .Sh CRL |
1002 | .nr nS 1 | 870 | .nr nS 1 |