summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorjmc <>2015-08-02 12:43:44 +0000
committerjmc <>2015-08-02 12:43:44 +0000
commita7f8a5dfc72005d65d7df2807c9b490e76b59623 (patch)
tree712d84698d5c7344ee34f85acd73fc59869aea70 /src
parent4b84ceb20bcf2b0e8677656ca8d15ecdc98e6f49 (diff)
downloadopenbsd-a7f8a5dfc72005d65d7df2807c9b490e76b59623.tar.gz
openbsd-a7f8a5dfc72005d65d7df2807c9b490e76b59623.tar.bz2
openbsd-a7f8a5dfc72005d65d7df2807c9b490e76b59623.zip
remove ssl3 bits; ok doug
Diffstat (limited to 'src')
-rw-r--r--src/usr.bin/openssl/openssl.172
1 files changed, 14 insertions, 58 deletions
diff --git a/src/usr.bin/openssl/openssl.1 b/src/usr.bin/openssl/openssl.1
index 5f849d7a30..8d49bf7b36 100644
--- a/src/usr.bin/openssl/openssl.1
+++ b/src/usr.bin/openssl/openssl.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: openssl.1,v 1.17 2015/07/27 17:28:39 sobrado Exp $ 1.\" $OpenBSD: openssl.1,v 1.18 2015/08/02 12:43:44 jmc Exp $
2.\" ==================================================================== 2.\" ====================================================================
3.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. 3.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
4.\" 4.\"
@@ -112,7 +112,7 @@
112.\" 112.\"
113.\" OPENSSL 113.\" OPENSSL
114.\" 114.\"
115.Dd $Mdocdate: July 27 2015 $ 115.Dd $Mdocdate: August 2 2015 $
116.Dt OPENSSL 1 116.Dt OPENSSL 1
117.Os 117.Os
118.Sh NAME 118.Sh NAME
@@ -1414,7 +1414,7 @@ then even if a certificate is issued with CA:TRUE it will not be valid.
1414.Sh CIPHERS 1414.Sh CIPHERS
1415.Nm openssl ciphers 1415.Nm openssl ciphers
1416.Op Fl hVv 1416.Op Fl hVv
1417.Op Fl ssl3 | tls1 1417.Op Fl tls1
1418.Op Ar cipherlist 1418.Op Ar cipherlist
1419.Pp 1419.Pp
1420The 1420The
@@ -1428,8 +1428,6 @@ The options are as follows:
1428.Bl -tag -width Ds 1428.Bl -tag -width Ds
1429.It Fl h , \&? 1429.It Fl h , \&?
1430Print a brief usage message. 1430Print a brief usage message.
1431.It Fl ssl3
1432Only include SSL v3 ciphers.
1433.It Fl tls1 1431.It Fl tls1
1434Only include TLS v1 ciphers. 1432Only include TLS v1 ciphers.
1435.It Fl V 1433.It Fl V
@@ -1438,14 +1436,12 @@ Like
1438but include cipher suite codes in output (hex format). 1436but include cipher suite codes in output (hex format).
1439.It Fl v 1437.It Fl v
1440Verbose option. 1438Verbose option.
1441List ciphers with a complete description of protocol version 1439List ciphers with a complete description of protocol version,
1442.Pq SSLv3, which includes TLS ,
1443key exchange, authentication, encryption and mac algorithms used along with 1440key exchange, authentication, encryption and mac algorithms used along with
1444any key size restrictions. 1441any key size restrictions.
1445Note that without the 1442Note that without the
1446.Fl v 1443.Fl v
1447option, ciphers may seem to appear twice in a cipher list; 1444option, ciphers may seem to appear twice in a cipher list.
1448this is when similar ciphers are available for SSL v3/TLS v1.
1449.It Ar cipherlist 1445.It Ar cipherlist
1450A cipher list to convert to a cipher preference list. 1446A cipher list to convert to a cipher preference list.
1451If it is not included, the default cipher list will be used. 1447If it is not included, the default cipher list will be used.
@@ -1468,9 +1464,7 @@ It can represent a list of cipher suites containing a certain algorithm,
1468or cipher suites of a certain type. 1464or cipher suites of a certain type.
1469For example 1465For example
1470.Em SHA1 1466.Em SHA1
1471represents all cipher suites using the digest algorithm SHA1, and 1467represents all cipher suites using the digest algorithm SHA1.
1472.Em SSLv3
1473represents all SSL v3 algorithms.
1474.Pp 1468.Pp
1475Lists of cipher suites can be combined in a single 1469Lists of cipher suites can be combined in a single
1476.Em cipher string 1470.Em cipher string
@@ -1578,8 +1572,8 @@ Cipher suites using ephemeral DH key agreement.
1578Cipher suites using RSA authentication, i.e. the certificates carry RSA keys. 1572Cipher suites using RSA authentication, i.e. the certificates carry RSA keys.
1579.It Ar aDSS , DSS 1573.It Ar aDSS , DSS
1580Cipher suites using DSS authentication, i.e. the certificates carry DSS keys. 1574Cipher suites using DSS authentication, i.e. the certificates carry DSS keys.
1581.It Ar TLSv1 , SSLv3 1575.It Ar TLSv1
1582TLS v1.0 or SSL v3.0 cipher suites, respectively. 1576TLS v1.0 cipher suites.
1583.It Ar DH 1577.It Ar DH
1584Cipher suites using DH, including anonymous DH. 1578Cipher suites using DH, including anonymous DH.
1585.It Ar ADH 1579.It Ar ADH
@@ -5148,8 +5142,6 @@ Acceptable values for
5148are 5142are
5149.Cm pkcs1 5143.Cm pkcs1
5150for PKCS#1 padding; 5144for PKCS#1 padding;
5151.Cm sslv3
5152for SSLv3 padding;
5153.Cm none 5145.Cm none
5154for no padding; 5146for no padding;
5155.Cm oaep 5147.Cm oaep
@@ -6475,7 +6467,6 @@ which it can be seen agrees with the recovered value above.
6475.Op Fl msg 6467.Op Fl msg
6476.Op Fl nbio 6468.Op Fl nbio
6477.Op Fl nbio_test 6469.Op Fl nbio_test
6478.Op Fl no_ssl3
6479.Op Fl no_ticket 6470.Op Fl no_ticket
6480.Op Fl no_tls1 6471.Op Fl no_tls1
6481.Op Fl no_tls1_1 6472.Op Fl no_tls1_1
@@ -6490,7 +6481,6 @@ which it can be seen agrees with the recovered value above.
6490.Op Fl reconnect 6481.Op Fl reconnect
6491.Op Fl servername Ar name 6482.Op Fl servername Ar name
6492.Op Fl showcerts 6483.Op Fl showcerts
6493.Op Fl ssl3
6494.Op Fl starttls Ar protocol 6484.Op Fl starttls Ar protocol
6495.Op Fl state 6485.Op Fl state
6496.Op Fl tls1 6486.Op Fl tls1
@@ -6599,10 +6589,7 @@ Show all protocol messages with hex dump.
6599Turns on non-blocking I/O. 6589Turns on non-blocking I/O.
6600.It Fl nbio_test 6590.It Fl nbio_test
6601Tests non-blocking I/O. 6591Tests non-blocking I/O.
6602.It Xo 6592.It Fl no_tls1 | no_tls1_1 | no_tls1_2 | tls1
6603.Fl no_ssl3 | no_tls1 | no_tls1_1 | no_tls1_2 |
6604.Fl ssl3 | tls1
6605.Xc
6606These options disable the use of certain SSL or TLS protocols. 6593These options disable the use of certain SSL or TLS protocols.
6607By default, the initial handshake uses a method which should be compatible 6594By default, the initial handshake uses a method which should be compatible
6608with all servers and permit them to use SSL v3 or TLS as appropriate. 6595with all servers and permit them to use SSL v3 or TLS as appropriate.
@@ -6717,15 +6704,10 @@ to retrieve a web page.
6717.Pp 6704.Pp
6718If the handshake fails, there are several possible causes; if it is 6705If the handshake fails, there are several possible causes; if it is
6719nothing obvious like no client certificate, then the 6706nothing obvious like no client certificate, then the
6720.Fl bugs , ssl3 , tls1 , no_ssl3 , no_tls1 , no_tls1_1 , 6707.Fl bugs , tls1 , no_tls1 , no_tls1_1 ,
6721and 6708and
6722.Fl no_tls1_2 6709.Fl no_tls1_2
6723options can be tried in case it is a buggy server. 6710options can be tried in case it is a buggy server.
6724In particular these options should be tried
6725.Em before
6726submitting a bug report to an
6727.Nm OpenSSL
6728mailing list.
6729.Pp 6711.Pp
6730A frequent problem when attempting to get client certificates working 6712A frequent problem when attempting to get client certificates working
6731is that a web client complains it has no certificates or gives an empty 6713is that a web client complains it has no certificates or gives an empty
@@ -6801,7 +6783,6 @@ We should really report information whenever a session is renegotiated.
6801.Op Fl nbio 6783.Op Fl nbio
6802.Op Fl nbio_test 6784.Op Fl nbio_test
6803.Op Fl no_dhe 6785.Op Fl no_dhe
6804.Op Fl no_ssl3
6805.Op Fl no_tls1 6786.Op Fl no_tls1
6806.Op Fl no_tls1_1 6787.Op Fl no_tls1_1
6807.Op Fl no_tls1_2 6788.Op Fl no_tls1_2
@@ -6811,7 +6792,6 @@ We should really report information whenever a session is renegotiated.
6811.Op Fl psk_hint Ar hint 6792.Op Fl psk_hint Ar hint
6812.Op Fl quiet 6793.Op Fl quiet
6813.Op Fl serverpref 6794.Op Fl serverpref
6814.Op Fl ssl3
6815.Op Fl state 6795.Op Fl state
6816.Op Fl tls1 6796.Op Fl tls1
6817.Op Fl Verify Ar depth 6797.Op Fl Verify Ar depth
@@ -6952,10 +6932,7 @@ Tests non-blocking I/O.
6952.It Fl no_dhe 6932.It Fl no_dhe
6953If this option is set, no DH parameters will be loaded, effectively 6933If this option is set, no DH parameters will be loaded, effectively
6954disabling the ephemeral DH cipher suites. 6934disabling the ephemeral DH cipher suites.
6955.It Xo 6935.It Fl no_tls1 | no_tls1_1 | no_tls1_2 | tls1
6956.Fl no_ssl3 | no_tls1 | no_tls1_1 | no_tls1_2 |
6957.Fl ssl3 | tls1
6958.Xc
6959These options disable the use of certain SSL or TLS protocols. 6936These options disable the use of certain SSL or TLS protocols.
6960By default, the initial handshake uses a method which should be compatible 6937By default, the initial handshake uses a method which should be compatible
6961with all servers and permit them to use SSL v3 or TLS as appropriate. 6938with all servers and permit them to use SSL v3 or TLS as appropriate.
@@ -7090,7 +7067,6 @@ unknown cipher suites a client says it supports.
7090.Op Fl nbio 7067.Op Fl nbio
7091.Op Fl new 7068.Op Fl new
7092.Op Fl reuse 7069.Op Fl reuse
7093.Op Fl ssl3
7094.Op Fl time Ar seconds 7070.Op Fl time Ar seconds
7095.Op Fl verify Ar depth 7071.Op Fl verify Ar depth
7096.Op Fl www Ar page 7072.Op Fl www Ar page
@@ -7160,21 +7136,6 @@ nor
7160.Fl reuse 7136.Fl reuse
7161are specified, 7137are specified,
7162they are both on by default and executed in sequence. 7138they are both on by default and executed in sequence.
7163.It Fl ssl3
7164This option disables the use of certain SSL or TLS protocols.
7165By default, the initial handshake uses a method
7166which should be compatible with all servers and permit them to use
7167SSL v3 or TLS as appropriate.
7168The timing program is not as rich in options to turn protocols on and off as
7169the
7170.Nm s_client
7171program and may not connect to all servers.
7172.Pp
7173Unfortunately there are a lot of ancient and broken servers in use which
7174cannot handle this technique and will fail to connect.
7175Some servers only work if TLS is turned off with the
7176.Fl ssl3
7177option.
7178.It Fl time Ar seconds 7139.It Fl time Ar seconds
7179Specifies how long 7140Specifies how long
7180.Pq in seconds 7141.Pq in seconds
@@ -7210,7 +7171,7 @@ can be used to measure the performance of an SSL connection.
7210To connect to an SSL HTTP server and get the default page the command 7171To connect to an SSL HTTP server and get the default page the command
7211.Bd -literal -offset indent 7172.Bd -literal -offset indent
7212$ openssl s_time -connect servername:443 -www / -CApath yourdir \e 7173$ openssl s_time -connect servername:443 -www / -CApath yourdir \e
7213 -CAfile yourfile.pem -cipher commoncipher [-ssl3] 7174 -CAfile yourfile.pem -cipher commoncipher
7214.Ed 7175.Ed
7215.Pp 7176.Pp
7216would typically be used 7177would typically be used
@@ -7224,12 +7185,7 @@ command for details.
7224If the handshake fails, there are several possible causes: 7185If the handshake fails, there are several possible causes:
7225if it is nothing obvious like no client certificate, the 7186if it is nothing obvious like no client certificate, the
7226.Fl bugs 7187.Fl bugs
7227and 7188option can be tried in case it is a buggy server.
7228.Fl ssl3
7229options can be tried in case it is a buggy server.
7230In particular you should play with these options
7231.Em before
7232submitting a bug report to an OpenSSL mailing list.
7233.Pp 7189.Pp
7234A frequent problem when attempting to get client certificates working 7190A frequent problem when attempting to get client certificates working
7235is that a web client complains it has no certificates or gives an empty 7191is that a web client complains it has no certificates or gives an empty
@@ -7358,7 +7314,7 @@ These are described below in more detail.
7358.Pp 7314.Pp
7359.Bl -tag -width "Verify return code " -compact 7315.Bl -tag -width "Verify return code " -compact
7360.It Ar Protocol 7316.It Ar Protocol
7361This is the protocol in use: TLSv1 or SSLv3. 7317This is the protocol in use.
7362.It Ar Cipher 7318.It Ar Cipher
7363The cipher used is the actual raw SSL or TLS cipher code; 7319The cipher used is the actual raw SSL or TLS cipher code;
7364see the SSL or TLS specifications for more information. 7320see the SSL or TLS specifications for more information.