From: Stefan Fritsch
Date: Mon, 13 Jun 2011 19:30:05 +0000 (+0000)
Subject: AFAICS, we don't have a default cipher suite but depend on openssl's default.
X-Git-Tag: 2.3.13~51
X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=6572b94bc6cfb41463edd9dc9d6f85cf0f04aa57;p=thirdparty%2Fapache%2Fhttpd.git
AFAICS, we don't have a default cipher suite but depend on openssl's default.
Document the fact that this default depends on the openssl version.
Recommend !aNULL over !ADH, because the former also excludes !AECDH in openssl
1.0+
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1135241 13f79535-47bb-0310-9956-ffa450edef68
---
diff --git a/docs/manual/mod/mod_ssl.xml b/docs/manual/mod/mod_ssl.xml
index b86528d30d4..43d36259090 100644
--- a/docs/manual/mod/mod_ssl.xml
+++ b/docs/manual/mod/mod_ssl.xml
@@ -614,7 +614,7 @@ SSLProtocol all -SSLv2
Cipher Suite available for negotiation in SSL
handshake
SSLCipherSuite cipher-spec
-SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP
+SSLCipherSuite DEFAULT (depends on OpenSSL version)
server config
virtual host
directory
@@ -711,9 +711,10 @@ prefixes are:
A simpler way to look at all of this is to use the ``openssl ciphers
-v
'' command which provides a nice way to successively create the
correct cipher-spec string. The default cipher-spec string
-is ``ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP
'' which
+depends on the version of the OpenSSL libraries used. Let's suppose it is
+``ALL:!aNULL:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP
'' which
means the following: first, remove from consideration any ciphers that do not
-authenticate, i.e. for SSL only the Anonymous Diffie-Hellman ciphers. Next,
+authenticate, i.e. for SSL the Anonymous Diffie-Hellman ciphers. Next,
use ciphers using RC4 and RSA. Next include the high, medium and then the low
security ciphers. Finally pull all SSLv2 and export ciphers to the
end of the list.
diff --git a/docs/manual/ssl/ssl_howto.xml b/docs/manual/ssl/ssl_howto.xml
index 6a214e231c7..9c787f87a01 100644
--- a/docs/manual/ssl/ssl_howto.xml
+++ b/docs/manual/ssl/ssl_howto.xml
@@ -67,7 +67,7 @@ only?
The following enables only the strongest ciphers:
httpd.conf
SSLProtocol all -SSLv2
- SSLCipherSuite HIGH:!ADH:!EXP:!MD5:!NULL
+ SSLCipherSuite HIGH:!aNULL:!EXP:!MD5:!NULL
While with the following configuration you enable two ciphers
@@ -75,7 +75,7 @@ only?
httpd.conf
SSLProtocol all -SSLv2
- SSLCipherSuite RC4-SHA:AES128-SHA:HIGH:!ADH:!EXP:!MD5:!NULL
+ SSLCipherSuite RC4-SHA:AES128-SHA:HIGH:!aNULL:!EXP:!MD5:!NULL
SSLHonorCipherOrder on
@@ -96,12 +96,12 @@ URL?
This can be done as follows:
# be liberal in general
- SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL
+ SSLCipherSuite ALL:!aNULL:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL
<Location /strong/area>
# but https://hostname/strong/area/ and below
# requires strong ciphers
- SSLCipherSuite HIGH:!ADH:!EXP:!MD5:!NULL
+ SSLCipherSuite HIGH:!aNULL:!EXP:!MD5:!NULL
</Location>