]> git.ipfire.org Git - thirdparty/openssl.git/blame - doc/apps/ciphers.pod
Fixed out-of-bounds read errors in ssl3_get_key_exchange.
[thirdparty/openssl.git] / doc / apps / ciphers.pod
CommitLineData
64287002
DSH
1=pod
2
3=head1 NAME
4
5ciphers - SSL cipher display and cipher list tool.
6
7=head1 SYNOPSIS
8
9B<openssl> B<ciphers>
0f817d3b 10[B<-s>]
64287002 11[B<-v>]
13e4670c 12[B<-V>]
64287002
DSH
13[B<-ssl2>]
14[B<-ssl3>]
15[B<-tls1>]
63d103ea 16[B<-stdname>]
64287002
DSH
17[B<cipherlist>]
18
19=head1 DESCRIPTION
20
13e4670c 21The B<ciphers> command converts textual OpenSSL cipher lists into ordered
64287002
DSH
22SSL cipher preference lists. It can be used as a test tool to determine
23the appropriate cipherlist.
24
25=head1 COMMAND OPTIONS
26
27=over 4
28
0f817d3b
DSH
29=item B<-s>
30
31Only list supported ciphers: those consistent with the security level. This
32is the actual cipher list an application will support. If this option is
33not used then ciphers excluded by the security level will still be listed.
34
64287002
DSH
35=item B<-v>
36
13e4670c 37Verbose option. List ciphers with a complete description of
8acdd759
BM
38protocol version (SSLv2 or SSLv3; the latter includes TLS), key exchange,
39authentication, encryption and mac algorithms used along with any key size
64287002 40restrictions and whether the algorithm is classed as an "export" cipher.
8acdd759
BM
41Note that without the B<-v> option, ciphers may seem to appear twice
42in a cipher list; this is when similar ciphers are available for
43SSL v2 and for SSL v3/TLS v1.
64287002 44
13e4670c
BM
45=item B<-V>
46
ffa45796 47Like B<-v>, but include cipher suite codes in output (hex format).
13e4670c 48
64287002
DSH
49=item B<-ssl3>
50
51only include SSL v3 ciphers.
52
53=item B<-ssl2>
54
55only include SSL v2 ciphers.
56
57=item B<-tls1>
58
59only include TLS v1 ciphers.
60
ffa45796
DSH
61=item B<-stdname>
62
63precede each ciphersuite by its standard name: only available is OpenSSL
64is built with tracing enabled (B<enable-ssl-trace> argument to Configure).
65
64287002
DSH
66=item B<-h>, B<-?>
67
68print a brief usage message.
69
70=item B<cipherlist>
71
72a cipher list to convert to a cipher preference list. If it is not included
73then the default cipher list will be used. The format is described below.
74
8548d442
RL
75=back
76
64287002
DSH
77=head1 CIPHER LIST FORMAT
78
79The cipher list consists of one or more I<cipher strings> separated by colons.
80Commas or spaces are also acceptable separators but colons are normally used.
81
82The actual cipher string can take several different forms.
83
84It can consist of a single cipher suite such as B<RC4-SHA>.
85
86It can represent a list of cipher suites containing a certain algorithm, or
87cipher suites of a certain type. For example B<SHA1> represents all ciphers
88suites using the digest algorithm SHA1 and B<SSLv3> represents all SSL v3
89algorithms.
90
91Lists of cipher suites can be combined in a single cipher string using the
92B<+> character. This is used as a logical B<and> operation. For example
93B<SHA1+DES> represents all cipher suites containing the SHA1 B<and> the DES
94algorithms.
95
96Each cipher string can be optionally preceded by the characters B<!>,
97B<-> or B<+>.
98
99If B<!> is used then the ciphers are permanently deleted from the list.
100The ciphers deleted can never reappear in the list even if they are
101explicitly stated.
102
103If B<-> is used then the ciphers are deleted from the list, but some or
104all of the ciphers can be added again by later options.
105
106If B<+> is used then the ciphers are moved to the end of the list. This
107option doesn't add any new ciphers it just moves matching existing ones.
108
109If none of these characters is present then the string is just interpreted
110as a list of ciphers to be appended to the current preference list. If the
111list includes any ciphers already present they will be ignored: that is they
112will not moved to the end of the list.
113
0f817d3b
DSH
114The cipher string B<@STRENGTH> can be used at any point to sort the current
115cipher list in order of encryption algorithm key length.
116
117The cipher string B<@SECLEVEL=n> can be used at any point to set the security
118level to B<n>.
64287002
DSH
119
120=head1 CIPHER STRINGS
121
122The following is a list of all permitted cipher strings and their meanings.
123
124=over 4
125
126=item B<DEFAULT>
127
96afc1cf 128the default cipher list. This is determined at compile time and, as of OpenSSL
fb552ac6 1291.0.0, is normally B<ALL:!aNULL:!eNULL>. This must be the first cipher string
3142c86d 130specified.
64287002 131
c6ccf055
LJ
132=item B<COMPLEMENTOFDEFAULT>
133
8be4e173 134the ciphers included in B<ALL>, but not enabled by default. Currently
343e5cf1
HK
135this is B<ADH> and B<AECDH>. Note that this rule does not cover B<eNULL>,
136which is not included by B<ALL> (use B<COMPLEMENTOFALL> if necessary).
c6ccf055 137
64287002
DSH
138=item B<ALL>
139
96afc1cf
BM
140all cipher suites except the B<eNULL> ciphers which must be explicitly enabled;
141as of OpenSSL, the B<ALL> cipher suites are reasonably ordered by default
64287002 142
c6ccf055
LJ
143=item B<COMPLEMENTOFALL>
144
145the cipher suites not enabled by B<ALL>, currently being B<eNULL>.
146
64287002
DSH
147=item B<HIGH>
148
ffa45796
DSH
149"high" encryption cipher suites. This currently means those with key lengths
150larger than 128 bits, and some cipher suites with 128-bit keys.
64287002
DSH
151
152=item B<MEDIUM>
153
ffa45796
DSH
154"medium" encryption cipher suites, currently some of those using 128 bit
155encryption.
64287002
DSH
156
157=item B<LOW>
158
ffa45796
DSH
159"low" encryption cipher suites, currently those using 64 or 56 bit encryption
160algorithms but excluding export cipher suites.
64287002
DSH
161
162=item B<EXP>, B<EXPORT>
163
164export encryption algorithms. Including 40 and 56 bits algorithms.
165
166=item B<EXPORT40>
167
16840 bit export encryption algorithms
169
170=item B<EXPORT56>
171
bcb38217
NL
17256 bit export encryption algorithms. In OpenSSL 0.9.8c and later the set of
17356 bit export ciphers is empty unless OpenSSL has been explicitly configured
174with support for experimental ciphers.
64287002
DSH
175
176=item B<eNULL>, B<NULL>
177
178the "NULL" ciphers that is those offering no encryption. Because these offer no
179encryption at all and are a security risk they are disabled unless explicitly
180included.
181
182=item B<aNULL>
183
184the cipher suites offering no authentication. This is currently the anonymous
343e5cf1
HK
185DH algorithms and anonymous ECDH algorithms. These cipher suites are vulnerable
186to a "man in the middle" attack and so their use is normally discouraged.
64287002 187
ffa45796 188=item B<kRSA>, B<aRSA>, B<RSA>
64287002 189
ffa45796 190cipher suites using RSA key exchange, authentication or either respectively.
64287002 191
ffa45796 192=item B<kDHr>, B<kDHd>, B<kDH>
64287002
DSH
193
194cipher suites using DH key agreement and DH certificates signed by CAs with RSA
ffa45796 195and DSS keys or either respectively.
64287002 196
343e5cf1
HK
197=item B<kDHE>, B<kEDH>
198
199cipher suites using ephemeral DH key agreement, including anonymous cipher
200suites.
201
202=item B<DHE>, B<EDH>
203
204cipher suites using authenticated ephemeral DH key agreement.
205
206=item B<ADH>
207
208anonymous DH cipher suites, note that this does not include anonymous Elliptic
209Curve DH (ECDH) cipher suites.
210
211=item B<DH>
212
213cipher suites using DH, including anonymous DH, ephemeral DH and fixed DH.
214
215=item B<kECDHr>, B<kECDHe>, B<kECDH>
216
217cipher suites using fixed ECDH key agreement signed by CAs with RSA and ECDSA
218keys or either respectively.
219
220=item B<kEECDH>, B<kECDHE>
221
222cipher suites using ephemeral ECDH key agreement, including anonymous
223cipher suites.
224
225=item B<ECDHE>, B<EECDHE>
226
227cipher suites using authenticated ephemeral ECDH key agreement.
228
229=item B<AECDH>
230
231anonymous Elliptic Curve Diffie Hellman cipher suites.
232
233=item B<ECDH>
234
235cipher suites using ECDH key exchange, including anonymous, ephemeral and
236fixed ECDH.
237
64287002
DSH
238=item B<aDSS>, B<DSS>
239
240cipher suites using DSS authentication, i.e. the certificates carry DSS keys.
241
242=item B<aDH>
243
244cipher suites effectively using DH authentication, i.e. the certificates carry
ffa45796 245DH keys.
64287002 246
343e5cf1
HK
247=item B<aECDH>
248
249cipher suites effectively using ECDH authentication, i.e. the certificates
250carry ECDH keys.
251
252=item B<aECDSA>, B<ECDSA>
253
254cipher suites using ECDSA authentication, i.e. the certificates carry ECDSA
255keys.
256
64287002
DSH
257=item B<kFZA>, B<aFZA>, B<eFZA>, B<FZA>
258
259ciphers suites using FORTEZZA key exchange, authentication, encryption or all
260FORTEZZA algorithms. Not implemented.
261
ffa45796 262=item B<TLSv1.2>, B<TLSv1>, B<SSLv3>, B<SSLv2>
64287002 263
ffa45796
DSH
264TLS v1.2, TLS v1.0, SSL v3.0 or SSL v2.0 cipher suites respectively. Note:
265there are no ciphersuites specific to TLS v1.1.
64287002 266
ffa45796
DSH
267=item B<AES128>, B<AES256>, B<AES>
268
269cipher suites using 128 bit AES, 256 bit AES or either 128 or 256 bit AES.
270
271=item B<AESGCM>
44fcd3ef 272
ffa45796
DSH
273AES in Galois Counter Mode (GCM): these ciphersuites are only supported
274in TLS v1.2.
44fcd3ef 275
ffa45796 276=item B<CAMELLIA128>, B<CAMELLIA256>, B<CAMELLIA>
96afc1cf 277
ffa45796
DSH
278cipher suites using 128 bit CAMELLIA, 256 bit CAMELLIA or either 128 or 256 bit
279CAMELLIA.
96afc1cf 280
64287002
DSH
281=item B<3DES>
282
283cipher suites using triple DES.
284
285=item B<DES>
286
287cipher suites using DES (not triple DES).
288
289=item B<RC4>
290
291cipher suites using RC4.
292
293=item B<RC2>
294
295cipher suites using RC2.
296
297=item B<IDEA>
298
299cipher suites using IDEA.
300
96afc1cf
BM
301=item B<SEED>
302
303cipher suites using SEED.
304
64287002
DSH
305=item B<MD5>
306
307cipher suites using MD5.
308
309=item B<SHA1>, B<SHA>
310
311cipher suites using SHA1.
312
ffa45796
DSH
313=item B<SHA256>, B<SHA384>
314
315ciphersuites using SHA256 or SHA384.
316
e5fa864f
DSH
317=item B<aGOST>
318
319cipher suites using GOST R 34.10 (either 2001 or 94) for authenticaction
320(needs an engine supporting GOST algorithms).
321
322=item B<aGOST01>
323
324cipher suites using GOST R 34.10-2001 authentication.
325
326=item B<aGOST94>
327
328cipher suites using GOST R 34.10-94 authentication (note that R 34.10-94
329standard has been expired so use GOST R 34.10-2001)
330
331=item B<kGOST>
332
333cipher suites, using VKO 34.10 key exchange, specified in the RFC 4357.
334
335=item B<GOST94>
336
337cipher suites, using HMAC based on GOST R 34.11-94.
338
339=item B<GOST89MAC>
340
341cipher suites using GOST 28147-89 MAC B<instead of> HMAC.
342
ffa45796
DSH
343=item B<PSK>
344
345cipher suites using pre-shared keys (PSK).
346
347=item B<SUITEB128>, B<SUITEB128ONLY>, B<SUITEB192>
348
349enables suite B mode operation using 128 (permitting 192 bit mode by peer)
350128 bit (not permitting 192 bit by peer) or 192 bit level of security
351respectively. If used these cipherstrings should appear first in the cipher
352list and anything after them is ignored. Setting Suite B mode has additional
353consequences required to comply with RFC6460. In particular the supported
354signature algorithms is reduced to support only ECDSA and SHA256 or SHA384,
355only the elliptic curves P-256 and P-384 can be used and only the two suite B
356compliant ciphersuites (ECDHE-ECDSA-AES128-GCM-SHA256 and
357ECDHE-ECDSA-AES256-GCM-SHA384) are permissible.
e5fa864f 358
64287002
DSH
359=back
360
361=head1 CIPHER SUITE NAMES
362
363The following lists give the SSL or TLS cipher suites names from the
44fcd3ef
LJ
364relevant specification and their OpenSSL equivalents. It should be noted,
365that several cipher suite names do not include the authentication used,
366e.g. DES-CBC3-SHA. In these cases, RSA authentication is used.
64287002
DSH
367
368=head2 SSL v3.0 cipher suites.
369
370 SSL_RSA_WITH_NULL_MD5 NULL-MD5
371 SSL_RSA_WITH_NULL_SHA NULL-SHA
372 SSL_RSA_EXPORT_WITH_RC4_40_MD5 EXP-RC4-MD5
373 SSL_RSA_WITH_RC4_128_MD5 RC4-MD5
374 SSL_RSA_WITH_RC4_128_SHA RC4-SHA
375 SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5 EXP-RC2-CBC-MD5
376 SSL_RSA_WITH_IDEA_CBC_SHA IDEA-CBC-SHA
377 SSL_RSA_EXPORT_WITH_DES40_CBC_SHA EXP-DES-CBC-SHA
378 SSL_RSA_WITH_DES_CBC_SHA DES-CBC-SHA
379 SSL_RSA_WITH_3DES_EDE_CBC_SHA DES-CBC3-SHA
380
999ffeca
DSH
381 SSL_DH_DSS_EXPORT_WITH_DES40_CBC_SHA EXP-DH-DSS-DES-CBC-SHA
382 SSL_DH_DSS_WITH_DES_CBC_SHA DH-DSS-DES-CBC-SHA
383 SSL_DH_DSS_WITH_3DES_EDE_CBC_SHA DH-DSS-DES-CBC3-SHA
384 SSL_DH_RSA_EXPORT_WITH_DES40_CBC_SHA EXP-DH-RSA-DES-CBC-SHA
385 SSL_DH_RSA_WITH_DES_CBC_SHA DH-RSA-DES-CBC-SHA
386 SSL_DH_RSA_WITH_3DES_EDE_CBC_SHA DH-RSA-DES-CBC3-SHA
0ecfd920
DKG
387 SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA EXP-DHE-DSS-DES-CBC-SHA
388 SSL_DHE_DSS_WITH_DES_CBC_SHA DHE-DSS-CBC-SHA
389 SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA DHE-DSS-DES-CBC3-SHA
390 SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA EXP-DHE-RSA-DES-CBC-SHA
391 SSL_DHE_RSA_WITH_DES_CBC_SHA DHE-RSA-DES-CBC-SHA
392 SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA DHE-RSA-DES-CBC3-SHA
64287002
DSH
393
394 SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 EXP-ADH-RC4-MD5
395 SSL_DH_anon_WITH_RC4_128_MD5 ADH-RC4-MD5
396 SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA EXP-ADH-DES-CBC-SHA
397 SSL_DH_anon_WITH_DES_CBC_SHA ADH-DES-CBC-SHA
398 SSL_DH_anon_WITH_3DES_EDE_CBC_SHA ADH-DES-CBC3-SHA
399
400 SSL_FORTEZZA_KEA_WITH_NULL_SHA Not implemented.
401 SSL_FORTEZZA_KEA_WITH_FORTEZZA_CBC_SHA Not implemented.
402 SSL_FORTEZZA_KEA_WITH_RC4_128_SHA Not implemented.
403
404=head2 TLS v1.0 cipher suites.
405
406 TLS_RSA_WITH_NULL_MD5 NULL-MD5
407 TLS_RSA_WITH_NULL_SHA NULL-SHA
408 TLS_RSA_EXPORT_WITH_RC4_40_MD5 EXP-RC4-MD5
409 TLS_RSA_WITH_RC4_128_MD5 RC4-MD5
410 TLS_RSA_WITH_RC4_128_SHA RC4-SHA
411 TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 EXP-RC2-CBC-MD5
412 TLS_RSA_WITH_IDEA_CBC_SHA IDEA-CBC-SHA
413 TLS_RSA_EXPORT_WITH_DES40_CBC_SHA EXP-DES-CBC-SHA
414 TLS_RSA_WITH_DES_CBC_SHA DES-CBC-SHA
415 TLS_RSA_WITH_3DES_EDE_CBC_SHA DES-CBC3-SHA
416
417 TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA Not implemented.
418 TLS_DH_DSS_WITH_DES_CBC_SHA Not implemented.
419 TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA Not implemented.
420 TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA Not implemented.
421 TLS_DH_RSA_WITH_DES_CBC_SHA Not implemented.
422 TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA Not implemented.
0ecfd920
DKG
423 TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA EXP-DHE-DSS-DES-CBC-SHA
424 TLS_DHE_DSS_WITH_DES_CBC_SHA DHE-DSS-CBC-SHA
425 TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA DHE-DSS-DES-CBC3-SHA
426 TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA EXP-DHE-RSA-DES-CBC-SHA
427 TLS_DHE_RSA_WITH_DES_CBC_SHA DHE-RSA-DES-CBC-SHA
428 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA DHE-RSA-DES-CBC3-SHA
64287002
DSH
429
430 TLS_DH_anon_EXPORT_WITH_RC4_40_MD5 EXP-ADH-RC4-MD5
431 TLS_DH_anon_WITH_RC4_128_MD5 ADH-RC4-MD5
432 TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA EXP-ADH-DES-CBC-SHA
433 TLS_DH_anon_WITH_DES_CBC_SHA ADH-DES-CBC-SHA
434 TLS_DH_anon_WITH_3DES_EDE_CBC_SHA ADH-DES-CBC3-SHA
435
44fcd3ef
LJ
436=head2 AES ciphersuites from RFC3268, extending TLS v1.0
437
438 TLS_RSA_WITH_AES_128_CBC_SHA AES128-SHA
439 TLS_RSA_WITH_AES_256_CBC_SHA AES256-SHA
440
999ffeca
DSH
441 TLS_DH_DSS_WITH_AES_128_CBC_SHA DH-DSS-AES128-SHA
442 TLS_DH_DSS_WITH_AES_256_CBC_SHA DH-DSS-AES256-SHA
443 TLS_DH_RSA_WITH_AES_128_CBC_SHA DH-RSA-AES128-SHA
444 TLS_DH_RSA_WITH_AES_256_CBC_SHA DH-RSA-AES256-SHA
44fcd3ef
LJ
445
446 TLS_DHE_DSS_WITH_AES_128_CBC_SHA DHE-DSS-AES128-SHA
447 TLS_DHE_DSS_WITH_AES_256_CBC_SHA DHE-DSS-AES256-SHA
448 TLS_DHE_RSA_WITH_AES_128_CBC_SHA DHE-RSA-AES128-SHA
449 TLS_DHE_RSA_WITH_AES_256_CBC_SHA DHE-RSA-AES256-SHA
450
451 TLS_DH_anon_WITH_AES_128_CBC_SHA ADH-AES128-SHA
452 TLS_DH_anon_WITH_AES_256_CBC_SHA ADH-AES256-SHA
453
f3dea9a5
BM
454=head2 Camellia ciphersuites from RFC4132, extending TLS v1.0
455
456 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA CAMELLIA128-SHA
457 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA CAMELLIA256-SHA
458
999ffeca
DSH
459 TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA DH-DSS-CAMELLIA128-SHA
460 TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA DH-DSS-CAMELLIA256-SHA
461 TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA DH-RSA-CAMELLIA128-SHA
462 TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA DH-RSA-CAMELLIA256-SHA
f3dea9a5
BM
463
464 TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA DHE-DSS-CAMELLIA128-SHA
465 TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA DHE-DSS-CAMELLIA256-SHA
466 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA DHE-RSA-CAMELLIA128-SHA
467 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA DHE-RSA-CAMELLIA256-SHA
468
469 TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA ADH-CAMELLIA128-SHA
470 TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA ADH-CAMELLIA256-SHA
471
96afc1cf
BM
472=head2 SEED ciphersuites from RFC4162, extending TLS v1.0
473
474 TLS_RSA_WITH_SEED_CBC_SHA SEED-SHA
475
999ffeca
DSH
476 TLS_DH_DSS_WITH_SEED_CBC_SHA DH-DSS-SEED-SHA
477 TLS_DH_RSA_WITH_SEED_CBC_SHA DH-RSA-SEED-SHA
96afc1cf
BM
478
479 TLS_DHE_DSS_WITH_SEED_CBC_SHA DHE-DSS-SEED-SHA
480 TLS_DHE_RSA_WITH_SEED_CBC_SHA DHE-RSA-SEED-SHA
481
482 TLS_DH_anon_WITH_SEED_CBC_SHA ADH-SEED-SHA
483
e5fa864f
DSH
484=head2 GOST ciphersuites from draft-chudov-cryptopro-cptls, extending TLS v1.0
485
486Note: these ciphers require an engine which including GOST cryptographic
487algorithms, such as the B<ccgost> engine, included in the OpenSSL distribution.
488
489 TLS_GOSTR341094_WITH_28147_CNT_IMIT GOST94-GOST89-GOST89
490 TLS_GOSTR341001_WITH_28147_CNT_IMIT GOST2001-GOST89-GOST89
491 TLS_GOSTR341094_WITH_NULL_GOSTR3411 GOST94-NULL-GOST94
492 TLS_GOSTR341001_WITH_NULL_GOSTR3411 GOST2001-NULL-GOST94
493
64287002
DSH
494=head2 Additional Export 1024 and other cipher suites
495
496Note: these ciphers can also be used in SSL v3.
497
498 TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA EXP1024-DES-CBC-SHA
499 TLS_RSA_EXPORT1024_WITH_RC4_56_SHA EXP1024-RC4-SHA
500 TLS_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA EXP1024-DHE-DSS-DES-CBC-SHA
501 TLS_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA EXP1024-DHE-DSS-RC4-SHA
502 TLS_DHE_DSS_WITH_RC4_128_SHA DHE-DSS-RC4-SHA
503
ffa45796 504=head2 Elliptic curve cipher suites.
c4afc40a 505
ffa45796
DSH
506 TLS_ECDH_RSA_WITH_NULL_SHA ECDH-RSA-NULL-SHA
507 TLS_ECDH_RSA_WITH_RC4_128_SHA ECDH-RSA-RC4-SHA
508 TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ECDH-RSA-DES-CBC3-SHA
509 TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ECDH-RSA-AES128-SHA
510 TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ECDH-RSA-AES256-SHA
511
512 TLS_ECDH_ECDSA_WITH_NULL_SHA ECDH-ECDSA-NULL-SHA
513 TLS_ECDH_ECDSA_WITH_RC4_128_SHA ECDH-ECDSA-RC4-SHA
514 TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ECDH-ECDSA-DES-CBC3-SHA
515 TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ECDH-ECDSA-AES128-SHA
516 TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ECDH-ECDSA-AES256-SHA
517
518 TLS_ECDHE_RSA_WITH_NULL_SHA ECDHE-RSA-NULL-SHA
519 TLS_ECDHE_RSA_WITH_RC4_128_SHA ECDHE-RSA-RC4-SHA
520 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ECDHE-RSA-DES-CBC3-SHA
521 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ECDHE-RSA-AES128-SHA
522 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDHE-RSA-AES256-SHA
523
524 TLS_ECDHE_ECDSA_WITH_NULL_SHA ECDHE-ECDSA-NULL-SHA
525 TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ECDHE-ECDSA-RC4-SHA
526 TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ECDHE-ECDSA-DES-CBC3-SHA
527 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ECDHE-ECDSA-AES128-SHA
528 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ECDHE-ECDSA-AES256-SHA
529
530 TLS_ECDH_anon_WITH_NULL_SHA AECDH-NULL-SHA
531 TLS_ECDH_anon_WITH_RC4_128_SHA AECDH-RC4-SHA
532 TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA AECDH-DES-CBC3-SHA
533 TLS_ECDH_anon_WITH_AES_128_CBC_SHA AECDH-AES128-SHA
534 TLS_ECDH_anon_WITH_AES_256_CBC_SHA AECDH-AES256-SHA
535
536=head2 TLS v1.2 cipher suites
537
538 TLS_RSA_WITH_NULL_SHA256 NULL-SHA256
539
540 TLS_RSA_WITH_AES_128_CBC_SHA256 AES128-SHA256
541 TLS_RSA_WITH_AES_256_CBC_SHA256 AES256-SHA256
542 TLS_RSA_WITH_AES_128_GCM_SHA256 AES128-GCM-SHA256
543 TLS_RSA_WITH_AES_256_GCM_SHA384 AES256-GCM-SHA384
544
545 TLS_DH_RSA_WITH_AES_128_CBC_SHA256 DH-RSA-AES128-SHA256
546 TLS_DH_RSA_WITH_AES_256_CBC_SHA256 DH-RSA-AES256-SHA256
547 TLS_DH_RSA_WITH_AES_128_GCM_SHA256 DH-RSA-AES128-GCM-SHA256
548 TLS_DH_RSA_WITH_AES_256_GCM_SHA384 DH-RSA-AES256-GCM-SHA384
549
550 TLS_DH_DSS_WITH_AES_128_CBC_SHA256 DH-DSS-AES128-SHA256
551 TLS_DH_DSS_WITH_AES_256_CBC_SHA256 DH-DSS-AES256-SHA256
552 TLS_DH_DSS_WITH_AES_128_GCM_SHA256 DH-DSS-AES128-GCM-SHA256
553 TLS_DH_DSS_WITH_AES_256_GCM_SHA384 DH-DSS-AES256-GCM-SHA384
554
555 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 DHE-RSA-AES128-SHA256
556 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 DHE-RSA-AES256-SHA256
557 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 DHE-RSA-AES128-GCM-SHA256
558 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DHE-RSA-AES256-GCM-SHA384
559
560 TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 DHE-DSS-AES128-SHA256
561 TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 DHE-DSS-AES256-SHA256
562 TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 DHE-DSS-AES128-GCM-SHA256
563 TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 DHE-DSS-AES256-GCM-SHA384
564
565 TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 ECDH-RSA-AES128-SHA256
566 TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 ECDH-RSA-AES256-SHA384
567 TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 ECDH-RSA-AES128-GCM-SHA256
568 TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 ECDH-RSA-AES256-GCM-SHA384
569
570 TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 ECDH-ECDSA-AES128-SHA256
571 TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 ECDH-ECDSA-AES256-SHA384
572 TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 ECDH-ECDSA-AES128-GCM-SHA256
573 TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 ECDH-ECDSA-AES256-GCM-SHA384
574
575 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ECDHE-RSA-AES128-SHA256
576 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ECDHE-RSA-AES256-SHA384
577 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDHE-RSA-AES128-GCM-SHA256
578 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDHE-RSA-AES256-GCM-SHA384
579
580 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ECDHE-ECDSA-AES128-SHA256
581 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ECDHE-ECDSA-AES256-SHA384
582 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDHE-ECDSA-AES128-GCM-SHA256
583 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDHE-ECDSA-AES256-GCM-SHA384
584
585 TLS_DH_anon_WITH_AES_128_CBC_SHA256 ADH-AES128-SHA256
586 TLS_DH_anon_WITH_AES_256_CBC_SHA256 ADH-AES256-SHA256
587 TLS_DH_anon_WITH_AES_128_GCM_SHA256 ADH-AES128-GCM-SHA256
588 TLS_DH_anon_WITH_AES_256_GCM_SHA384 ADH-AES256-GCM-SHA384
589
590=head2 Pre shared keying (PSK) cipheruites
591
999ffeca 592 TLS_PSK_WITH_RC4_128_SHA PSK-RC4-SHA
ffa45796
DSH
593 TLS_PSK_WITH_3DES_EDE_CBC_SHA PSK-3DES-EDE-CBC-SHA
594 TLS_PSK_WITH_AES_128_CBC_SHA PSK-AES128-CBC-SHA
999ffeca 595 TLS_PSK_WITH_AES_256_CBC_SHA PSK-AES256-CBC-SHA
ffa45796
DSH
596
597=head2 Deprecated SSL v2.0 cipher suites.
64287002
DSH
598
599 SSL_CK_RC4_128_WITH_MD5 RC4-MD5
600 SSL_CK_RC4_128_EXPORT40_WITH_MD5 EXP-RC4-MD5
601 SSL_CK_RC2_128_CBC_WITH_MD5 RC2-MD5
602 SSL_CK_RC2_128_CBC_EXPORT40_WITH_MD5 EXP-RC2-MD5
603 SSL_CK_IDEA_128_CBC_WITH_MD5 IDEA-CBC-MD5
604 SSL_CK_DES_64_CBC_WITH_MD5 DES-CBC-MD5
605 SSL_CK_DES_192_EDE3_CBC_WITH_MD5 DES-CBC3-MD5
606
64287002 607
ffa45796 608=head1 NOTES
64287002
DSH
609
610Some compiled versions of OpenSSL may not include all the ciphers
611listed here because some ciphers were excluded at compile time.
612
613=head1 EXAMPLES
614
615Verbose listing of all OpenSSL ciphers including NULL ciphers:
616
617 openssl ciphers -v 'ALL:eNULL'
618
619Include all ciphers except NULL and anonymous DH then sort by
620strength:
621
622 openssl ciphers -v 'ALL:!ADH:@STRENGTH'
623
343e5cf1
HK
624Include all ciphers except ones with no encryption (eNULL) or no
625authentication (aNULL):
626
627 openssl ciphers -v 'ALL:!aNULL'
628
64287002
DSH
629Include only 3DES ciphers and then place RSA ciphers last:
630
631 openssl ciphers -v '3DES:+RSA'
632
c6ccf055
LJ
633Include all RC4 ciphers but leave out those without authentication:
634
635 openssl ciphers -v 'RC4:!COMPLEMENTOFDEFAULT'
636
637Include all chiphers with RSA authentication but leave out ciphers without
638encryption.
639
640 openssl ciphers -v 'RSA:!COMPLEMENTOFALL'
641
0f817d3b
DSH
642Set security level to 2 and display all ciphers consistent with level 2:
643
89e67474 644 openssl ciphers -s -v 'ALL:@SECLEVEL=2'
0f817d3b 645
64287002
DSH
646=head1 SEE ALSO
647
bb075f88 648L<s_client(1)|s_client(1)>, L<s_server(1)|s_server(1)>, L<ssl(3)|ssl(3)>
64287002 649
c6ccf055
LJ
650=head1 HISTORY
651
13e4670c
BM
652The B<COMPLENTOFALL> and B<COMPLEMENTOFDEFAULT> selection options
653for cipherlist strings were added in OpenSSL 0.9.7.
fb552ac6 654The B<-V> option for the B<ciphers> command was added in OpenSSL 1.0.0.
c6ccf055 655
64287002 656=cut