From 9205812071bcd7bcf098efd80b82ec2bc1a62da4 Mon Sep 17 00:00:00 2001 From: Christian Heimes Date: Mon, 8 Feb 2016 15:52:25 +0100 Subject: Add server support for DHE ciphers Similar patch was provided by Vitezslav Cizek Heavily modified by Rob Crittenden https://fedorahosted.org/mod_nss/ticket/15 --- docs/mod_nss.html | 40 +++++++++++++++++++++++++++++++++++++++- 1 file changed, 39 insertions(+), 1 deletion(-) (limited to 'docs/mod_nss.html') diff --git a/docs/mod_nss.html b/docs/mod_nss.html index 37588e8..c84f938 100644 --- a/docs/mod_nss.html +++ b/docs/mod_nss.html @@ -522,7 +522,7 @@ If it contains neither then mod_nss first tries to apply OpenSSL ciphers then NS
All ciphers are disabled by default.

-Available ciphers are:
+Available RSA ciphers are:

@@ -675,6 +675,43 @@ Available ciphers are:
+
The available server-side DHE ciphers are:
+
+ + + + + + + + + + + + +
Cipher Name
+
NSS Cipher definition
+
Protocol
+
dhe_rsa_des_sha
+
TLS_DHE_RSA_WITH_DES_CBC_SHA
+
SSLv3/TLSv1.0/TLSv1.1/TLSv1.2
+
dhe_rsa_3des_sha
+
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
+
TLSv1.0/TLSv1.1/TLSv1.2
dhe_rsa_aes_128_sha
+
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
+
TLSv1.0/TLSv1.1/TLSv1.2
dhe_rsa_aes_256_sha
+
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
+
TLSv1.0/TLSv1.1/TLSv1.2
dhe_rsa_camellia_128_sha
+
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
+
TLSv1.0/TLSv1.1/TLSv1.2
dhe_rsa_camellia_256_sha
+
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
+
TLSv1.0/TLSv1.1/TLSv1.2
dhe_rsa_aes_128_sha256
+
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
+
TLSv1.2
dhe_rsa_aes_256_sha256
+
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
+
TLSv1.2
dhe_rsa_aes_128_gcm_sha_256
+
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
+
TLSv1.2

Additionally there are a number of ECC ciphers:

@@ -979,6 +1016,7 @@ The default is off.
Example

NSSSessionTickets on
+

NSSUserName

-- cgit