summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorschwarze <>2018-04-10 22:07:30 +0000
committerschwarze <>2018-04-10 22:07:30 +0000
commit4a86db5884fb87b302e9846edd558538a0a73215 (patch)
tree8f0f95f7ad9951944433ace8c889cd454c1713fe /src
parentab5441dabf7863796dfb9a9fa4b4fc32a5330169 (diff)
downloadopenbsd-4a86db5884fb87b302e9846edd558538a0a73215.tar.gz
openbsd-4a86db5884fb87b302e9846edd558538a0a73215.tar.bz2
openbsd-4a86db5884fb87b302e9846edd558538a0a73215.zip
Delete the description of the argument of the "ciphers" command
because it was (1) woefully incomplete, (2) partially outdated and wrong, (3) in parts imprecisely worded and hard to understand, (4) excessively technical for a section 1 manual, (5) of excessive size for this particular page, (6) and didn't belong here in the first place because it essentially tried to document a C API - SSL_CTX_set_cipher_list(3), which is now documented, so point to it.
Diffstat (limited to 'src')
-rw-r--r--src/usr.bin/openssl/openssl.1158
1 files changed, 13 insertions, 145 deletions
diff --git a/src/usr.bin/openssl/openssl.1 b/src/usr.bin/openssl/openssl.1
index f371a8b178..39fdf8bb27 100644
--- a/src/usr.bin/openssl/openssl.1
+++ b/src/usr.bin/openssl/openssl.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: openssl.1,v 1.92 2018/03/31 12:46:12 schwarze Exp $ 1.\" $OpenBSD: openssl.1,v 1.93 2018/04/10 22:07:30 schwarze Exp $
2.\" ==================================================================== 2.\" ====================================================================
3.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. 3.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
4.\" 4.\"
@@ -110,7 +110,7 @@
110.\" copied and put under another distribution licence 110.\" copied and put under another distribution licence
111.\" [including the GNU Public Licence.] 111.\" [including the GNU Public Licence.]
112.\" 112.\"
113.Dd $Mdocdate: March 31 2018 $ 113.Dd $Mdocdate: April 10 2018 $
114.Dt OPENSSL 1 114.Dt OPENSSL 1
115.Os 115.Os
116.Sh NAME 116.Sh NAME
@@ -837,14 +837,20 @@ The same as
837.Sh CIPHERS 837.Sh CIPHERS
838.Nm openssl ciphers 838.Nm openssl ciphers
839.Op Fl hVv 839.Op Fl hVv
840.Op Ar cipherlist 840.Op Ar control
841.Pp 841.Pp
842The 842The
843.Nm ciphers 843.Nm ciphers
844command converts 844command converts the
845.Nm openssl 845.Ar control
846cipher lists into ordered SSL cipher preference lists. 846string from the format documented in
847It can be used as a way to determine the appropriate cipher list. 847.Xr SSL_CTX_set_cipher_list 3
848into an ordered SSL cipher suite preference list.
849If no
850.Ar control
851string is specified, the
852.Cm DEFAULT
853list is printed.
848.Pp 854.Pp
849The options are as follows: 855The options are as follows:
850.Bl -tag -width Ds 856.Bl -tag -width Ds
@@ -859,144 +865,6 @@ key exchange, authentication, encryption, and mac algorithms.
859Like 865Like
860.Fl V , 866.Fl V ,
861but without cipher suite codes. 867but without cipher suite codes.
862.It Ar cipherlist
863A cipher list to convert to a cipher preference list.
864If it is not included, the default cipher list will be used.
865.Pp
866The cipher list consists of one or more cipher strings
867separated by colons.
868Commas or spaces are also acceptable separators, but colons are normally used.
869.Pp
870The actual cipher string can take several different forms:
871.Pp
872It can consist of a single cipher suite, such as RC4-SHA.
873.Pp
874It can represent a list of cipher suites containing a certain algorithm,
875or cipher suites of a certain type.
876For example SHA1 represents all cipher suites using the digest algorithm SHA1.
877.Pp
878Lists of cipher suites can be combined in a single cipher string using the
879.Sq +
880character
881(logical AND operation).
882For example, SHA1+DES represents all cipher suites
883containing the SHA1 and DES algorithms.
884.Pp
885Each cipher string can be optionally preceded by the characters
886.Sq \&! ,
887.Sq - ,
888or
889.Sq + .
890If
891.Sq !\&
892is used, then the ciphers are permanently deleted from the list.
893The ciphers deleted can never reappear in the list even if they are
894explicitly stated.
895If
896.Sq -
897is used, then the ciphers are deleted from the list, but some or
898all of the ciphers can be added again by later options.
899If
900.Sq +
901is used, then the ciphers are moved to the end of the list.
902This option doesn't add any new ciphers, it just moves matching existing ones.
903.Pp
904If none of these characters is present, the string is just interpreted
905as a list of ciphers to be appended to the current preference list.
906If the list includes any ciphers already present, they will be ignored;
907that is, they will not be moved to the end of the list.
908.Pp
909Additionally, the cipher string
910.Cm @STRENGTH
911can be used at any point to sort the current cipher list in order of
912encryption algorithm key length.
913.El
914.Pp
915The following is a list of all permitted cipher strings and their meanings.
916.Bl -tag -width "XXXX"
917.It Cm DEFAULT
918The default cipher list.
919This is determined at compile time and is currently
920.Cm ALL:!aNULL:!eNULL:!SSLv2 .
921This must be the first cipher string specified.
922.It Cm COMPLEMENTOFDEFAULT
923The ciphers included in
924.Cm ALL ,
925but not enabled by default.
926Currently this is
927.Cm ADH .
928Note that this rule does not cover
929.Cm eNULL ,
930which is not included by
931.Cm ALL
932(use
933.Cm COMPLEMENTOFALL
934if necessary).
935.It Cm ALL
936All cipher suites except the
937.Cm eNULL
938ciphers, which must be explicitly enabled.
939.It Cm COMPLEMENTOFALL
940The cipher suites not enabled by
941.Cm ALL ,
942currently being
943.Cm eNULL .
944.It Cm HIGH
945.Qq High
946encryption cipher suites.
947This currently means those with key lengths larger than 128 bits.
948.It Cm MEDIUM
949.Qq Medium
950encryption cipher suites, currently those using 128-bit encryption.
951.It Cm LOW
952.Qq Low
953encryption cipher suites, currently those using 64- or 56-bit encryption
954algorithms.
955.It Cm eNULL , NULL
956The
957.Qq NULL
958ciphers; that is, those offering no encryption.
959Because these offer no encryption at all and are a security risk,
960they are disabled unless explicitly included.
961.It Cm aNULL
962The cipher suites offering no authentication.
963This is currently the anonymous DH algorithms.
964These cipher suites are vulnerable to a
965.Qq man in the middle
966attack, so their use is normally discouraged.
967.It Cm kRSA , RSA
968Cipher suites using RSA key exchange.
969.It Cm kEDH
970Cipher suites using ephemeral DH key agreement.
971.It Cm aRSA
972Cipher suites using RSA authentication, i.e. the certificates carry RSA keys.
973.It Cm aDSS , DSS
974Cipher suites using DSS authentication, i.e. the certificates carry DSS keys.
975.It Cm TLSv1
976TLS v1.0 cipher suites.
977.It Cm DH
978Cipher suites using DH, including anonymous DH.
979.It Cm ADH
980Anonymous DH cipher suites.
981.It Cm AES
982Cipher suites using AES.
983.It Cm 3DES
984Cipher suites using triple DES.
985.It Cm DES
986Cipher suites using DES
987.Pq not triple DES .
988.It Cm RC4
989Cipher suites using RC4.
990.It Cm CAMELLIA
991Cipher suites using Camellia.
992.It Cm CHACHA20
993Cipher suites using ChaCha20.
994.It Cm IDEA
995Cipher suites using IDEA.
996.It Cm MD5
997Cipher suites using MD5.
998.It Cm SHA1 , SHA
999Cipher suites using SHA1.
1000.El 868.El
1001.Sh CRL 869.Sh CRL
1002.nr nS 1 870.nr nS 1