summaryrefslogtreecommitdiffstats
path: root/base/server/share
diff options
context:
space:
mode:
authorChristina Fu <cfu@redhat.com>2015-08-14 19:57:15 +0200
committerChristina Fu <cfu@redhat.com>2015-08-14 18:26:05 -0700
commit67c895851781d69343979cbcff138184803880ea (patch)
tree265dc9539f3d8352cc2fee2b8663a45034334ca8 /base/server/share
parent4743a86beb48b81edc90d8e35ebbebfa414faea2 (diff)
downloadpki-67c895851781d69343979cbcff138184803880ea.tar.gz
pki-67c895851781d69343979cbcff138184803880ea.tar.xz
pki-67c895851781d69343979cbcff138184803880ea.zip
Ticket #1556 Weak HTTPS TLS ciphers
This patch fixes the RSA ciphers that were mistakenly turned on under ECC section, and off under RSA section. A few adjustments have also been made based on Bob Relyea's feedback. A new file, <instance>/conf/ciphers.info was also created to 1. provide info on the ciphers 2. provide default rsa and ecc ciphers for admins to incorporate into earlier instances (as migration script might not be ideal due to possible customization)
Diffstat (limited to 'base/server/share')
-rw-r--r--base/server/share/conf/ciphers.info66
1 files changed, 66 insertions, 0 deletions
diff --git a/base/server/share/conf/ciphers.info b/base/server/share/conf/ciphers.info
new file mode 100644
index 000000000..998c51e98
--- /dev/null
+++ b/base/server/share/conf/ciphers.info
@@ -0,0 +1,66 @@
+##
+# BEGIN COPYRIGHT BLOCK
+# Copyright (C) 2015 Red Hat, Inc.
+# All rights reserved.
+# END COPYRIGHT BLOCK
+#
+# This file contains the default sslRangeCiphers that come with this version of
+# the PKI software in its <instance>/conf/server.xml file.
+# Depending on which kind of SSL server you have, you want to reference the
+# corresponding cipher suite for making adjustments to your instance server.xml.
+#
+#
+# About the TLS range related parameters:
+# 'sslVersionRangeStream'
+# 'sslVersionRangeDatagram'
+# 'sslRangeCiphers'
+# The sslVersionRangeStream and sslVersionRangeDatagram by default
+# contains values that are supported by the native NSS. Changes can
+# be made to restrict or relax the support.
+# The sslRangeCiphers by default conatins a list of ciphers best
+# for the type of the server installed. Changes can be made to suit
+# each site's needs.
+# Although TLS1.2 ciphers (SHA256) are preferred, many older clients
+# do not support them. For example,
+# the following "preferred modern" ciphers are on by default, and by
+# simply limiting the sslVersionRange* parameters, they can be turned off.
+# TLS_RSA_WITH_AES_128_CBC_SHA256,
+# TLS_RSA_WITH_AES_256_CBC_SHA256,
+# TLS_RSA_WITH_AES_128_GCM_SHA256,
+# TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
+# TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,
+# TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
+# TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
+# The following ciphers are supported in rhel7.2 or greater, and they
+# are off by default, and can be turned on by sites running rhel7.2 or
+# greater:
+# TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA,
+# TLS_DHE_RSA_WITH_AES_128_CBC_SHA,
+# TLS_DHE_RSA_WITH_AES_256_CBC_SHA,
+# TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,
+# TLS_DHE_RSA_WITH_AES_256_CBC_SHA256,
+# TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
+# Although the following (somewhat weaker ciphers, in CBC mode), though
+# adaquate for the CS operations, they can be turned off if needed:
+# TLS_RSA_WITH_3DES_EDE_CBC_SHA,
+# TLS_RSA_WITH_AES_128_CBC_SHA,
+# TLS_RSA_WITH_AES_256_CBC_SHA,
+# TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
+# Note: In an EC CS server setup, you will see by default that the
+# following RSA ciphers are left on. Those are used for installation
+# where the actual systems certs have not yet been crated, and a
+# temporary RSA ssl server cert is at play.
+# Those can be turned off manually by sites.
+# TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
+# TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
+# TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
+# These ciphers might be removed by the installation script in some
+# future release.
+#
+##
+# For RSA servers:
+ sslRangeCiphers="-TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,-TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,-TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,-TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,-TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,-TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,-TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,-TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,-TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,-TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,-TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,+TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,+TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,+TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,-TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA,-TLS_DHE_DSS_WITH_AES_128_CBC_SHA,-TLS_DHE_DSS_WITH_AES_256_CBC_SHA,-TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA,-TLS_DHE_RSA_WITH_AES_128_CBC_SHA,-TLS_DHE_RSA_WITH_AES_256_CBC_SHA,-TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,-TLS_DHE_RSA_WITH_AES_256_CBC_SHA256,-TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,-TLS_DHE_DSS_WITH_AES_128_GCM_SHA256,-TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,+TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,-TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,+TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,-TLS_RSA_WITH_AES_128_CBC_SHA256,-TLS_RSA_WITH_AES_256_CBC_SHA256,-TLS_RSA_WITH_AES_128_GCM_SHA256,+TLS_RSA_WITH_3DES_EDE_CBC_SHA,+TLS_RSA_WITH_AES_128_CBC_SHA,+TLS_RSA_WITH_AES_256_CBC_SHA"
+#
+#
+# For ECC servers:
+ sslRangeCiphers="-TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,-TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,-TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,-TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,-TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,-TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,-TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,+TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,-TLS_RSA_WITH_3DES_EDE_CBC_SHA,-TLS_RSA_WITH_AES_128_CBC_SHA,-TLS_RSA_WITH_AES_256_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,-TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,-TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,-TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA,-TLS_DHE_DSS_WITH_AES_128_CBC_SHA,-TLS_DHE_DSS_WITH_AES_256_CBC_SHA,-TLS_DHE_DSS_WITH_AES_128_GCM_SHA256,-TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA,-TLS_DHE_RSA_WITH_AES_128_CBC_SHA,-TLS_DHE_RSA_WITH_AES_256_CBC_SHA,-TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,-TLS_DHE_RSA_WITH_AES_256_CBC_SHA256,-TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,-TLS_RSA_WITH_AES_128_CBC_SHA256,-TLS_RSA_WITH_AES_256_CBC_SHA256,-TLS_RSA_WITH_AES_128_GCM_SHA256,+TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,+TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,+TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,+TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,+TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"