diff options
author | Christina Fu <cfu@redhat.com> | 2015-08-14 19:57:15 +0200 |
---|---|---|
committer | Christina Fu <cfu@redhat.com> | 2015-08-14 18:26:05 -0700 |
commit | 67c895851781d69343979cbcff138184803880ea (patch) | |
tree | 265dc9539f3d8352cc2fee2b8663a45034334ca8 /base/server/share | |
parent | 4743a86beb48b81edc90d8e35ebbebfa414faea2 (diff) | |
download | pki-67c895851781d69343979cbcff138184803880ea.tar.gz pki-67c895851781d69343979cbcff138184803880ea.tar.xz pki-67c895851781d69343979cbcff138184803880ea.zip |
Ticket #1556 Weak HTTPS TLS ciphers
This patch fixes the RSA ciphers that were mistakenly turned on under ECC
section, and off under RSA section. A few adjustments have also been made
based on Bob Relyea's feedback. A new file, <instance>/conf/ciphers.info
was also created to
1. provide info on the ciphers
2. provide default rsa and ecc ciphers for admins to incorporate into earlier
instances (as migration script might not be ideal due to possible customization)
Diffstat (limited to 'base/server/share')
-rw-r--r-- | base/server/share/conf/ciphers.info | 66 |
1 files changed, 66 insertions, 0 deletions
diff --git a/base/server/share/conf/ciphers.info b/base/server/share/conf/ciphers.info new file mode 100644 index 000000000..998c51e98 --- /dev/null +++ b/base/server/share/conf/ciphers.info @@ -0,0 +1,66 @@ +## +# BEGIN COPYRIGHT BLOCK +# Copyright (C) 2015 Red Hat, Inc. +# All rights reserved. +# END COPYRIGHT BLOCK +# +# This file contains the default sslRangeCiphers that come with this version of +# the PKI software in its <instance>/conf/server.xml file. +# Depending on which kind of SSL server you have, you want to reference the +# corresponding cipher suite for making adjustments to your instance server.xml. +# +# +# About the TLS range related parameters: +# 'sslVersionRangeStream' +# 'sslVersionRangeDatagram' +# 'sslRangeCiphers' +# The sslVersionRangeStream and sslVersionRangeDatagram by default +# contains values that are supported by the native NSS. Changes can +# be made to restrict or relax the support. +# The sslRangeCiphers by default conatins a list of ciphers best +# for the type of the server installed. Changes can be made to suit +# each site's needs. +# Although TLS1.2 ciphers (SHA256) are preferred, many older clients +# do not support them. For example, +# the following "preferred modern" ciphers are on by default, and by +# simply limiting the sslVersionRange* parameters, they can be turned off. +# TLS_RSA_WITH_AES_128_CBC_SHA256, +# TLS_RSA_WITH_AES_256_CBC_SHA256, +# TLS_RSA_WITH_AES_128_GCM_SHA256, +# TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, +# TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, +# TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, +# TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 +# The following ciphers are supported in rhel7.2 or greater, and they +# are off by default, and can be turned on by sites running rhel7.2 or +# greater: +# TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA, +# TLS_DHE_RSA_WITH_AES_128_CBC_SHA, +# TLS_DHE_RSA_WITH_AES_256_CBC_SHA, +# TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, +# TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, +# TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 +# Although the following (somewhat weaker ciphers, in CBC mode), though +# adaquate for the CS operations, they can be turned off if needed: +# TLS_RSA_WITH_3DES_EDE_CBC_SHA, +# TLS_RSA_WITH_AES_128_CBC_SHA, +# TLS_RSA_WITH_AES_256_CBC_SHA, +# TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA +# Note: In an EC CS server setup, you will see by default that the +# following RSA ciphers are left on. Those are used for installation +# where the actual systems certs have not yet been crated, and a +# temporary RSA ssl server cert is at play. +# Those can be turned off manually by sites. +# TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, +# TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, +# TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 +# These ciphers might be removed by the installation script in some +# future release. +# +## +# For RSA servers: + sslRangeCiphers="-TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,-TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,-TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,-TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,-TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,-TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,-TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,-TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,-TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,-TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,-TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,+TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,+TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,+TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,-TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA,-TLS_DHE_DSS_WITH_AES_128_CBC_SHA,-TLS_DHE_DSS_WITH_AES_256_CBC_SHA,-TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA,-TLS_DHE_RSA_WITH_AES_128_CBC_SHA,-TLS_DHE_RSA_WITH_AES_256_CBC_SHA,-TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,-TLS_DHE_RSA_WITH_AES_256_CBC_SHA256,-TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,-TLS_DHE_DSS_WITH_AES_128_GCM_SHA256,-TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,+TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,-TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,+TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,-TLS_RSA_WITH_AES_128_CBC_SHA256,-TLS_RSA_WITH_AES_256_CBC_SHA256,-TLS_RSA_WITH_AES_128_GCM_SHA256,+TLS_RSA_WITH_3DES_EDE_CBC_SHA,+TLS_RSA_WITH_AES_128_CBC_SHA,+TLS_RSA_WITH_AES_256_CBC_SHA" +# +# +# For ECC servers: + sslRangeCiphers="-TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,-TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,-TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,-TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,-TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,-TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,-TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,+TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,-TLS_RSA_WITH_3DES_EDE_CBC_SHA,-TLS_RSA_WITH_AES_128_CBC_SHA,-TLS_RSA_WITH_AES_256_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,-TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,-TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,-TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA,-TLS_DHE_DSS_WITH_AES_128_CBC_SHA,-TLS_DHE_DSS_WITH_AES_256_CBC_SHA,-TLS_DHE_DSS_WITH_AES_128_GCM_SHA256,-TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA,-TLS_DHE_RSA_WITH_AES_128_CBC_SHA,-TLS_DHE_RSA_WITH_AES_256_CBC_SHA,-TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,-TLS_DHE_RSA_WITH_AES_256_CBC_SHA256,-TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,-TLS_RSA_WITH_AES_128_CBC_SHA256,-TLS_RSA_WITH_AES_256_CBC_SHA256,-TLS_RSA_WITH_AES_128_GCM_SHA256,+TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,+TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,+TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,+TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,+TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" |