From 6572b94bc6cfb41463edd9dc9d6f85cf0f04aa57 Mon Sep 17 00:00:00 2001
From: Stefan Fritsch
Date: Mon, 13 Jun 2011 19:30:05 +0000
Subject: [PATCH] AFAICS, we don't have a default cipher suite but depend on
openssl's default. Document the fact that this default depends on the openssl
version. Recommend !aNULL over !ADH, because the former also excludes !AECDH
in openssl 1.0+
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1135241 13f79535-47bb-0310-9956-ffa450edef68
---
docs/manual/mod/mod_ssl.xml | 7 ++++---
docs/manual/ssl/ssl_howto.xml | 8 ++++----
2 files changed, 8 insertions(+), 7 deletions(-)
diff --git a/docs/manual/mod/mod_ssl.xml b/docs/manual/mod/mod_ssl.xml
index b86528d30d..43d3625909 100644
--- a/docs/manual/mod/mod_ssl.xml
+++ b/docs/manual/mod/mod_ssl.xml
@@ -614,7 +614,7 @@ SSLProtocol all -SSLv2
Cipher Suite available for negotiation in SSL
handshake
SSLCipherSuite cipher-spec
-SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP
+SSLCipherSuite DEFAULT (depends on OpenSSL version)
server config
virtual host
directory
@@ -711,9 +711,10 @@ prefixes are:
A simpler way to look at all of this is to use the ``openssl ciphers
-v
'' command which provides a nice way to successively create the
correct cipher-spec string. The default cipher-spec string
-is ``ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP
'' which
+depends on the version of the OpenSSL libraries used. Let's suppose it is
+``ALL:!aNULL:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP
'' which
means the following: first, remove from consideration any ciphers that do not
-authenticate, i.e. for SSL only the Anonymous Diffie-Hellman ciphers. Next,
+authenticate, i.e. for SSL the Anonymous Diffie-Hellman ciphers. Next,
use ciphers using RC4 and RSA. Next include the high, medium and then the low
security ciphers. Finally pull all SSLv2 and export ciphers to the
end of the list.
diff --git a/docs/manual/ssl/ssl_howto.xml b/docs/manual/ssl/ssl_howto.xml
index 6a214e231c..9c787f87a0 100644
--- a/docs/manual/ssl/ssl_howto.xml
+++ b/docs/manual/ssl/ssl_howto.xml
@@ -67,7 +67,7 @@ only?
The following enables only the strongest ciphers:
httpd.conf
SSLProtocol all -SSLv2
- SSLCipherSuite HIGH:!ADH:!EXP:!MD5:!NULL
+ SSLCipherSuite HIGH:!aNULL:!EXP:!MD5:!NULL
While with the following configuration you enable two ciphers
@@ -75,7 +75,7 @@ only?
httpd.conf
SSLProtocol all -SSLv2
- SSLCipherSuite RC4-SHA:AES128-SHA:HIGH:!ADH:!EXP:!MD5:!NULL
+ SSLCipherSuite RC4-SHA:AES128-SHA:HIGH:!aNULL:!EXP:!MD5:!NULL
SSLHonorCipherOrder on
@@ -96,12 +96,12 @@ URL?
This can be done as follows:
# be liberal in general
- SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL
+ SSLCipherSuite ALL:!aNULL:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL
<Location /strong/area>
# but https://hostname/strong/area/ and below
# requires strong ciphers
- SSLCipherSuite HIGH:!ADH:!EXP:!MD5:!NULL
+ SSLCipherSuite HIGH:!aNULL:!EXP:!MD5:!NULL
</Location>
--
2.40.0