diff options
author | Christian Heimes <cheimes@redhat.com> | 2016-02-08 15:52:25 +0100 |
---|---|---|
committer | Rob Crittenden <rcritten@redhat.com> | 2016-02-29 16:09:17 -0500 |
commit | 9205812071bcd7bcf098efd80b82ec2bc1a62da4 (patch) | |
tree | 8cbbaa655156965d11da77585052d7762a69a1f8 /docs/mod_nss.html | |
parent | 09eff5ae973290ff333928487e13974aa7ad0764 (diff) | |
download | mod_nss-9205812071bcd7bcf098efd80b82ec2bc1a62da4.tar.gz mod_nss-9205812071bcd7bcf098efd80b82ec2bc1a62da4.tar.xz mod_nss-9205812071bcd7bcf098efd80b82ec2bc1a62da4.zip |
Add server support for DHE ciphers
Similar patch was provided by Vitezslav Cizek <vcizek@suse.com>
Heavily modified by Rob Crittenden <rcritten@redhat.com>
https://fedorahosted.org/mod_nss/ticket/15
Diffstat (limited to 'docs/mod_nss.html')
-rw-r--r-- | docs/mod_nss.html | 40 |
1 files changed, 39 insertions, 1 deletions
diff --git a/docs/mod_nss.html b/docs/mod_nss.html index 37588e8..c84f938 100644 --- a/docs/mod_nss.html +++ b/docs/mod_nss.html @@ -522,7 +522,7 @@ If it contains neither then mod_nss first tries to apply OpenSSL ciphers then NS <br> All ciphers are disabled by default. <br> <br> -Available ciphers are:<br> +Available RSA ciphers are:<br> <br> <table style="width: 70%; text-align: left;" cellpadding="2" cellspacing="2" border="1"> <tbody> @@ -675,6 +675,43 @@ Available ciphers are:<br> </tbody> </table> +<br>The available server-side DHE ciphers are:<br> +<br> +<table style="width: 70%; text-align: left;" border="1" cellpadding="2" cellspacing="2"> +<tbody><tr><td style="vertical-align: top; font-weight: bold;">Cipher Name<br> + </td><td style="vertical-align: top; font-weight: bold;">NSS Cipher definition<br> + </td><td style="vertical-align: top; font-weight: bold;">Protocol<br> + </td></tr><tr><td style="vertical-align: top;">dhe_rsa_des_sha<br> + </td><td style="vertical-align: top;">TLS_DHE_RSA_WITH_DES_CBC_SHA<br> +</td><td style="vertical-align: top;">SSLv3/TLSv1.0/TLSv1.1/TLSv1.2<br> + </td></tr><tr><td style="vertical-align: top;">dhe_rsa_3des_sha<br> + </td><td style="vertical-align: top;">TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA<br> + </td><td style="vertical-align: top;">TLSv1.0/TLSv1.1/TLSv1.2</td></tr><tr><td style="vertical-align: top;">dhe_rsa_aes_128_sha<br> + </td><td style="vertical-align: top;">TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA<br> + </td><td style="vertical-align: top;">TLSv1.0/TLSv1.1/TLSv1.2</td></tr><tr><td style="vertical-align: top;">dhe_rsa_aes_256_sha<br> + </td><td style="vertical-align: top;">TLS_DHE_RSA_WITH_AES_256_CBC_SHA<br> + </td><td style="vertical-align: top;">TLSv1.0/TLSv1.1/TLSv1.2</td></tr><tr><td style="vertical-align: top;">dhe_rsa_camellia_128_sha<br> +</td><td style="vertical-align: top;">TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA<br> + </td><td style="vertical-align: top;">TLSv1.0/TLSv1.1/TLSv1.2</td></tr><tr><td style="vertical-align: top;">dhe_rsa_camellia_256_sha<br> +</td><td style="vertical-align: top;">TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA<br> + </td><td style="vertical-align: top;">TLSv1.0/TLSv1.1/TLSv1.2</td></tr><tr><td style="vertical-align: top;">dhe_rsa_aes_128_sha256<br> +</td><td style="vertical-align: top;">TLS_DHE_RSA_WITH_AES_128_CBC_SHA256<br> + </td><td style="vertical-align: top;">TLSv1.2</td></tr><tr> + <td valign="top">dhe_rsa_aes_256_sha256<br> + </td> + <td valign="top">TLS_DHE_RSA_WITH_AES_256_CBC_SHA256<br> + </td> + <td valign="top">TLSv1.2</td> + </tr> + <tr> + <td valign="top">dhe_rsa_aes_128_gcm_sha_256<br> + </td> + <td valign="top">TLS_DHE_RSA_WITH_AES_128_GCM_SHA256<br> + </td> + <td valign="top">TLSv1.2</td> + </tr> +</tbody> +</table> <br> Additionally there are a number of ECC ciphers:<br> <br> @@ -979,6 +1016,7 @@ The default is off.<br> <span style="font-weight: bold;">Example</span><br> <br> <big><big>NSSSessionTickets on<br> +</big></big> <br> <big><big>NSSUserName<br> </big></big><br> |