883 lines
40 KiB
HTML
Executable File
883 lines
40 KiB
HTML
Executable File
<?xml version="1.0" ?>
|
|
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
|
<html xmlns="http://www.w3.org/1999/xhtml">
|
|
<head>
|
|
<title>openssl-ciphers</title>
|
|
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
|
|
<link rev="made" href="mailto:root@localhost" />
|
|
</head>
|
|
|
|
<body style="background-color: white">
|
|
|
|
|
|
<!-- INDEX BEGIN -->
|
|
<div name="index">
|
|
<p><a name="__index__"></a></p>
|
|
|
|
<ul>
|
|
|
|
<li><a href="#name">NAME</a></li>
|
|
<li><a href="#synopsis">SYNOPSIS</a></li>
|
|
<li><a href="#description">DESCRIPTION</a></li>
|
|
<li><a href="#options">OPTIONS</a></li>
|
|
<li><a href="#cipher_list_format">CIPHER LIST FORMAT</a></li>
|
|
<li><a href="#cipher_strings">CIPHER STRINGS</a></li>
|
|
<li><a href="#cipher_suite_names">CIPHER SUITE NAMES</a></li>
|
|
<ul>
|
|
|
|
<li><a href="#ssl_v3_0_cipher_suites">SSL v3.0 cipher suites</a></li>
|
|
<li><a href="#tls_v1_0_cipher_suites">TLS v1.0 cipher suites</a></li>
|
|
<li><a href="#aes_cipher_suites_from_rfc3268__extending_tls_v1_0">AES cipher suites from <a href="http://www.ietf.org/rfc/rfc3268.txt" class="rfc">RFC3268</a>, extending TLS v1.0</a></li>
|
|
<li><a href="#camellia_cipher_suites_from_rfc4132__extending_tls_v1_0">Camellia cipher suites from <a href="http://www.ietf.org/rfc/rfc4132.txt" class="rfc">RFC4132</a>, extending TLS v1.0</a></li>
|
|
<li><a href="#seed_cipher_suites_from_rfc4162__extending_tls_v1_0">SEED cipher suites from <a href="http://www.ietf.org/rfc/rfc4162.txt" class="rfc">RFC4162</a>, extending TLS v1.0</a></li>
|
|
<li><a href="#gost_cipher_suites_from_draft_chudov_cryptopro_cptls__extending_tls_v1_0">GOST cipher suites from draft-chudov-cryptopro-cptls, extending TLS v1.0</a></li>
|
|
<li><a href="#additional_export_1024_and_other_cipher_suites">Additional Export 1024 and other cipher suites</a></li>
|
|
<li><a href="#elliptic_curve_cipher_suites">Elliptic curve cipher suites</a></li>
|
|
<li><a href="#tls_v1_2_cipher_suites">TLS v1.2 cipher suites</a></li>
|
|
<li><a href="#aria_cipher_suites_from_rfc6209__extending_tls_v1_2">ARIA cipher suites from <a href="http://www.ietf.org/rfc/rfc6209.txt" class="rfc">RFC6209</a>, extending TLS v1.2</a></li>
|
|
<li><a href="#camellia_hmac_based_cipher_suites_from_rfc6367__extending_tls_v1_2">Camellia HMAC-Based cipher suites from <a href="http://www.ietf.org/rfc/rfc6367.txt" class="rfc">RFC6367</a>, extending TLS v1.2</a></li>
|
|
<li><a href="#pre_shared_keying__psk__cipher_suites">Pre-shared keying (PSK) cipher suites</a></li>
|
|
<li><a href="#chacha20_poly1305_cipher_suites__extending_tls_v1_2">ChaCha20-Poly1305 cipher suites, extending TLS v1.2</a></li>
|
|
<li><a href="#tls_v1_3_cipher_suites">TLS v1.3 cipher suites</a></li>
|
|
<li><a href="#older_names_used_by_openssl">Older names used by OpenSSL</a></li>
|
|
</ul>
|
|
|
|
<li><a href="#notes">NOTES</a></li>
|
|
<li><a href="#examples">EXAMPLES</a></li>
|
|
<li><a href="#see_also">SEE ALSO</a></li>
|
|
<li><a href="#history">HISTORY</a></li>
|
|
<li><a href="#copyright">COPYRIGHT</a></li>
|
|
</ul>
|
|
|
|
<hr name="index" />
|
|
</div>
|
|
<!-- INDEX END -->
|
|
|
|
<p>
|
|
</p>
|
|
<hr />
|
|
<h1><a name="name">NAME</a></h1>
|
|
<p>openssl-ciphers - SSL cipher display and cipher list tool</p>
|
|
<p>
|
|
</p>
|
|
<hr />
|
|
<h1><a name="synopsis">SYNOPSIS</a></h1>
|
|
<p><strong>openssl</strong> <strong>ciphers</strong>
|
|
[<strong>-help</strong>]
|
|
[<strong>-s</strong>]
|
|
[<strong>-v</strong>]
|
|
[<strong>-V</strong>]
|
|
[<strong>-ssl3</strong>]
|
|
[<strong>-tls1</strong>]
|
|
[<strong>-tls1_1</strong>]
|
|
[<strong>-tls1_2</strong>]
|
|
[<strong>-tls1_3</strong>]
|
|
[<strong>-s</strong>]
|
|
[<strong>-psk</strong>]
|
|
[<strong>-srp</strong>]
|
|
[<strong>-stdname</strong>]
|
|
[<strong>-convert</strong> <em>name</em>]
|
|
[<strong>-ciphersuites</strong> <em>val</em>]
|
|
[<em>cipherlist</em>]</p>
|
|
<p>
|
|
</p>
|
|
<hr />
|
|
<h1><a name="description">DESCRIPTION</a></h1>
|
|
<p>This command converts textual OpenSSL cipher lists into
|
|
ordered SSL cipher preference lists. It can be used as a test tool to
|
|
determine the appropriate cipherlist.</p>
|
|
<p>
|
|
</p>
|
|
<hr />
|
|
<h1><a name="options">OPTIONS</a></h1>
|
|
<dl>
|
|
<dt><strong><a name="help" class="item"><strong>-help</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Print a usage message.</p>
|
|
</dd>
|
|
<dt><strong><a name="s" class="item"><strong>-s</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Only list supported ciphers: those consistent with the security level, and
|
|
minimum and maximum protocol version. This is closer to the actual cipher list
|
|
an application will support.</p>
|
|
<p>PSK and SRP ciphers are not enabled by default: they require <strong>-psk</strong> or <strong>-srp</strong>
|
|
to enable them.</p>
|
|
<p>It also does not change the default list of supported signature algorithms.</p>
|
|
<p>On a server the list of supported ciphers might also exclude other ciphers
|
|
depending on the configured certificates and presence of DH parameters.</p>
|
|
<p>If this option is not used then all ciphers that match the cipherlist will be
|
|
listed.</p>
|
|
</dd>
|
|
<dt><strong><a name="psk" class="item"><strong>-psk</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>When combined with <strong>-s</strong> includes cipher suites which require PSK.</p>
|
|
</dd>
|
|
<dt><strong><a name="srp" class="item"><strong>-srp</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>When combined with <strong>-s</strong> includes cipher suites which require SRP.</p>
|
|
</dd>
|
|
<dt><strong><a name="v" class="item"><strong>-v</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Verbose output: For each cipher suite, list details as provided by
|
|
<em>SSL_CIPHER_description(3)</em>.</p>
|
|
</dd>
|
|
<dt><strong><a name="v" class="item"><strong>-V</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Like <strong>-v</strong>, but include the official cipher suite values in hex.</p>
|
|
</dd>
|
|
<dt><strong><a name="tls1_3_tls1_2_tls1_1_tls1_ssl3" class="item"><strong>-tls1_3</strong>, <strong>-tls1_2</strong>, <strong>-tls1_1</strong>, <strong>-tls1</strong>, <strong>-ssl3</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>In combination with the <strong>-s</strong> option, list the ciphers which could be used if
|
|
the specified protocol were negotiated.
|
|
Note that not all protocols and flags may be available, depending on how
|
|
OpenSSL was built.</p>
|
|
</dd>
|
|
<dt><strong><a name="stdname" class="item"><strong>-stdname</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Precede each cipher suite by its standard name.</p>
|
|
</dd>
|
|
<dt><strong><a name="convert_name" class="item"><strong>-convert</strong> <em>name</em></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Convert a standard cipher <em>name</em> to its OpenSSL name.</p>
|
|
</dd>
|
|
<dt><strong><a name="ciphersuites_val" class="item"><strong>-ciphersuites</strong> <em>val</em></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Sets the list of TLSv1.3 ciphersuites. This list will be combined with any
|
|
TLSv1.2 and below ciphersuites that have been configured. The format for this
|
|
list is a simple colon (":") separated list of TLSv1.3 ciphersuite names. By
|
|
default this value is:</p>
|
|
<pre>
|
|
TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256</pre>
|
|
</dd>
|
|
<dt><strong><a name="cipherlist" class="item"><strong>cipherlist</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>A cipher list of TLSv1.2 and below ciphersuites to convert to a cipher
|
|
preference list. This list will be combined with any TLSv1.3 ciphersuites that
|
|
have been configured. If it is not included then the default cipher list will be
|
|
used. The format is described below.</p>
|
|
</dd>
|
|
</dl>
|
|
<p>
|
|
</p>
|
|
<hr />
|
|
<h1><a name="cipher_list_format">CIPHER LIST FORMAT</a></h1>
|
|
<p>The cipher list consists of one or more <em>cipher strings</em> separated by colons.
|
|
Commas or spaces are also acceptable separators but colons are normally used.</p>
|
|
<p>The actual cipher string can take several different forms.</p>
|
|
<p>It can consist of a single cipher suite such as <strong>RC4-SHA</strong>.</p>
|
|
<p>It can represent a list of cipher suites containing a certain algorithm, or
|
|
cipher suites of a certain type. For example <strong>SHA1</strong> represents all ciphers
|
|
suites using the digest algorithm SHA1 and <strong>SSLv3</strong> represents all SSL v3
|
|
algorithms.</p>
|
|
<p>Lists of cipher suites can be combined in a single cipher string using the
|
|
<strong>+</strong> character. This is used as a logical <strong>and</strong> operation. For example
|
|
<strong>SHA1+DES</strong> represents all cipher suites containing the SHA1 <strong>and</strong> the DES
|
|
algorithms.</p>
|
|
<p>Each cipher string can be optionally preceded by the characters <strong>!</strong>,
|
|
<strong>-</strong> or <strong>+</strong>.</p>
|
|
<p>If <strong>!</strong> is used then the ciphers are permanently deleted from the list.
|
|
The ciphers deleted can never reappear in the list even if they are
|
|
explicitly stated.</p>
|
|
<p>If <strong>-</strong> is used then the ciphers are deleted from the list, but some or
|
|
all of the ciphers can be added again by later options.</p>
|
|
<p>If <strong>+</strong> is used then the ciphers are moved to the end of the list. This
|
|
option doesn't add any new ciphers it just moves matching existing ones.</p>
|
|
<p>If none of these characters is present then the string is just interpreted
|
|
as a list of ciphers to be appended to the current preference list. If the
|
|
list includes any ciphers already present they will be ignored: that is they
|
|
will not moved to the end of the list.</p>
|
|
<p>The cipher string <strong>@STRENGTH</strong> can be used at any point to sort the current
|
|
cipher list in order of encryption algorithm key length.</p>
|
|
<p>The cipher string <strong>@SECLEVEL</strong>=<em>n</em> can be used at any point to set the security
|
|
level to <em>n</em>, which should be a number between zero and five, inclusive.
|
|
See <em>SSL_CTX_set_security_level(3)</em> for a description of what each level means.</p>
|
|
<p>The cipher list can be prefixed with the <strong>DEFAULT</strong> keyword, which enables
|
|
the default cipher list as defined below. Unlike cipher strings,
|
|
this prefix may not be combined with other strings using <strong>+</strong> character.
|
|
For example, <strong>DEFAULT+DES</strong> is not valid.</p>
|
|
<p>The content of the default list is determined at compile time and normally
|
|
corresponds to <strong>ALL:!COMPLEMENTOFDEFAULT:!eNULL</strong>.</p>
|
|
<p>
|
|
</p>
|
|
<hr />
|
|
<h1><a name="cipher_strings">CIPHER STRINGS</a></h1>
|
|
<p>The following is a list of all permitted cipher strings and their meanings.</p>
|
|
<dl>
|
|
<dt><strong><a name="complementofdefault" class="item"><strong>COMPLEMENTOFDEFAULT</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>The ciphers included in <strong>ALL</strong>, but not enabled by default. Currently
|
|
this includes all RC4 and anonymous ciphers. Note that this rule does
|
|
not cover <strong>eNULL</strong>, which is not included by <strong>ALL</strong> (use <strong>COMPLEMENTOFALL</strong> if
|
|
necessary). Note that RC4 based cipher suites are not built into OpenSSL by
|
|
default (see the enable-weak-ssl-ciphers option to Configure).</p>
|
|
</dd>
|
|
<dt><strong><a name="all" class="item"><strong>ALL</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>All cipher suites except the <strong>eNULL</strong> ciphers (which must be explicitly enabled
|
|
if needed).
|
|
As of OpenSSL 1.0.0, the <strong>ALL</strong> cipher suites are sensibly ordered by default.</p>
|
|
</dd>
|
|
<dt><strong><a name="complementofall" class="item"><strong>COMPLEMENTOFALL</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>The cipher suites not enabled by <strong>ALL</strong>, currently <strong>eNULL</strong>.</p>
|
|
</dd>
|
|
<dt><strong><a name="high" class="item"><strong>HIGH</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>"High" encryption cipher suites. This currently means those with key lengths
|
|
larger than 128 bits, and some cipher suites with 128-bit keys.</p>
|
|
</dd>
|
|
<dt><strong><a name="medium" class="item"><strong>MEDIUM</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>"Medium" encryption cipher suites, currently some of those using 128 bit
|
|
encryption.</p>
|
|
</dd>
|
|
<dt><strong><a name="low" class="item"><strong>LOW</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>"Low" encryption cipher suites, currently those using 64 or 56 bit
|
|
encryption algorithms but excluding export cipher suites. All these
|
|
cipher suites have been removed as of OpenSSL 1.1.0.</p>
|
|
</dd>
|
|
<dt><strong><a name="enull_null" class="item"><strong>eNULL</strong>, <strong>NULL</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>The "NULL" ciphers that is those offering no encryption. Because these offer no
|
|
encryption at all and are a security risk they are not enabled via either the
|
|
<strong>DEFAULT</strong> or <strong>ALL</strong> cipher strings.
|
|
Be careful when building cipherlists out of lower-level primitives such as
|
|
<strong>kRSA</strong> or <strong>aECDSA</strong> as these do overlap with the <strong>eNULL</strong> ciphers. When in
|
|
doubt, include <strong>!eNULL</strong> in your cipherlist.</p>
|
|
</dd>
|
|
<dt><strong><a name="anull" class="item"><strong>aNULL</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>The cipher suites offering no authentication. This is currently the anonymous
|
|
DH algorithms and anonymous ECDH algorithms. These cipher suites are vulnerable
|
|
to "man in the middle" attacks and so their use is discouraged.
|
|
These are excluded from the <strong>DEFAULT</strong> ciphers, but included in the <strong>ALL</strong>
|
|
ciphers.
|
|
Be careful when building cipherlists out of lower-level primitives such as
|
|
<strong>kDHE</strong> or <strong>AES</strong> as these do overlap with the <strong>aNULL</strong> ciphers.
|
|
When in doubt, include <strong>!aNULL</strong> in your cipherlist.</p>
|
|
</dd>
|
|
<dt><strong><a name="krsa_arsa_rsa" class="item"><strong>kRSA</strong>, <strong>aRSA</strong>, <strong>RSA</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using RSA key exchange or authentication. <strong>RSA</strong> is an alias for
|
|
<strong>kRSA</strong>.</p>
|
|
</dd>
|
|
<dt><strong><a name="kdhr_kdhd_kdh" class="item"><strong>kDHr</strong>, <strong>kDHd</strong>, <strong>kDH</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using static DH key agreement and DH certificates signed by CAs
|
|
with RSA and DSS keys or either respectively.
|
|
All these cipher suites have been removed in OpenSSL 1.1.0.</p>
|
|
</dd>
|
|
<dt><strong><a name="kdhe_kedh_dh" class="item"><strong>kDHE</strong>, <strong>kEDH</strong>, <strong>DH</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using ephemeral DH key agreement, including anonymous cipher
|
|
suites.</p>
|
|
</dd>
|
|
<dt><strong><a name="dhe_edh" class="item"><strong>DHE</strong>, <strong>EDH</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using authenticated ephemeral DH key agreement.</p>
|
|
</dd>
|
|
<dt><strong><a name="adh" class="item"><strong>ADH</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Anonymous DH cipher suites, note that this does not include anonymous Elliptic
|
|
Curve DH (ECDH) cipher suites.</p>
|
|
</dd>
|
|
<dt><strong><a name="keecdh_kecdhe_ecdh" class="item"><strong>kEECDH</strong>, <strong>kECDHE</strong>, <strong>ECDH</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using ephemeral ECDH key agreement, including anonymous
|
|
cipher suites.</p>
|
|
</dd>
|
|
<dt><strong><a name="ecdhe_eecdh" class="item"><strong>ECDHE</strong>, <strong>EECDH</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using authenticated ephemeral ECDH key agreement.</p>
|
|
</dd>
|
|
<dt><strong><a name="aecdh" class="item"><strong>AECDH</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Anonymous Elliptic Curve Diffie-Hellman cipher suites.</p>
|
|
</dd>
|
|
<dt><strong><a name="adss_dss" class="item"><strong>aDSS</strong>, <strong>DSS</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using DSS authentication, i.e. the certificates carry DSS keys.</p>
|
|
</dd>
|
|
<dt><strong><a name="adh" class="item"><strong>aDH</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites effectively using DH authentication, i.e. the certificates carry
|
|
DH keys.
|
|
All these cipher suites have been removed in OpenSSL 1.1.0.</p>
|
|
</dd>
|
|
<dt><strong><a name="aecdsa_ecdsa" class="item"><strong>aECDSA</strong>, <strong>ECDSA</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using ECDSA authentication, i.e. the certificates carry ECDSA
|
|
keys.</p>
|
|
</dd>
|
|
<dt><strong><a name="tlsv1_2_tlsv1_0_sslv3" class="item"><strong>TLSv1.2</strong>, <strong>TLSv1.0</strong>, <strong>SSLv3</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Lists cipher suites which are only supported in at least TLS v1.2, TLS v1.0 or
|
|
SSL v3.0 respectively.
|
|
Note: there are no cipher suites specific to TLS v1.1.
|
|
Since this is only the minimum version, if, for example, TLSv1.0 is negotiated
|
|
then both TLSv1.0 and SSLv3.0 cipher suites are available.</p>
|
|
<p>Note: these cipher strings <strong>do not</strong> change the negotiated version of SSL or
|
|
TLS, they only affect the list of available cipher suites.</p>
|
|
</dd>
|
|
<dt><strong><a name="aes128_aes256_aes" class="item"><strong>AES128</strong>, <strong>AES256</strong>, <strong>AES</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>cipher suites using 128 bit AES, 256 bit AES or either 128 or 256 bit AES.</p>
|
|
</dd>
|
|
<dt><strong><a name="aesgcm" class="item"><strong>AESGCM</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>AES in Galois Counter Mode (GCM): these cipher suites are only supported
|
|
in TLS v1.2.</p>
|
|
</dd>
|
|
<dt><strong><a name="aesccm_aesccm8" class="item"><strong>AESCCM</strong>, <strong>AESCCM8</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>AES in Cipher Block Chaining - Message Authentication Mode (CCM): these
|
|
cipher suites are only supported in TLS v1.2. <strong>AESCCM</strong> references CCM
|
|
cipher suites using both 16 and 8 octet Integrity Check Value (ICV)
|
|
while <strong>AESCCM8</strong> only references 8 octet ICV.</p>
|
|
</dd>
|
|
<dt><strong><a name="aria128_aria256_aria" class="item"><strong>ARIA128</strong>, <strong>ARIA256</strong>, <strong>ARIA</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using 128 bit ARIA, 256 bit ARIA or either 128 or 256 bit
|
|
ARIA.</p>
|
|
</dd>
|
|
<dt><strong><a name="camellia128_camellia256_camellia" class="item"><strong>CAMELLIA128</strong>, <strong>CAMELLIA256</strong>, <strong>CAMELLIA</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using 128 bit CAMELLIA, 256 bit CAMELLIA or either 128 or 256 bit
|
|
CAMELLIA.</p>
|
|
</dd>
|
|
<dt><strong><a name="chacha20" class="item"><strong>CHACHA20</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using ChaCha20.</p>
|
|
</li>
|
|
<li><strong><a name="des" class="item"><strong>3DES</strong></a></strong>
|
|
|
|
<p>Cipher suites using triple DES.</p>
|
|
</dd>
|
|
<dt><strong><a name="des2" class="item"><strong>DES</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using DES (not triple DES).
|
|
All these cipher suites have been removed in OpenSSL 1.1.0.</p>
|
|
</dd>
|
|
<dt><strong><a name="rc4" class="item"><strong>RC4</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using RC4.</p>
|
|
</dd>
|
|
<dt><strong><a name="rc2" class="item"><strong>RC2</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using RC2.</p>
|
|
</dd>
|
|
<dt><strong><a name="idea" class="item"><strong>IDEA</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using IDEA.</p>
|
|
</dd>
|
|
<dt><strong><a name="seed" class="item"><strong>SEED</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using SEED.</p>
|
|
</dd>
|
|
<dt><strong><a name="md5" class="item"><strong>MD5</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using MD5.</p>
|
|
</dd>
|
|
<dt><strong><a name="sha1_sha" class="item"><strong>SHA1</strong>, <strong>SHA</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using SHA1.</p>
|
|
</dd>
|
|
<dt><strong><a name="sha256_sha384" class="item"><strong>SHA256</strong>, <strong>SHA384</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using SHA256 or SHA384.</p>
|
|
</dd>
|
|
<dt><strong><a name="agost" class="item"><strong>aGOST</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using GOST R 34.10 (either 2001 or 94) for authentication
|
|
(needs an engine supporting GOST algorithms).</p>
|
|
</dd>
|
|
<dt><strong><a name="agost01" class="item"><strong>aGOST01</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using GOST R 34.10-2001 authentication.</p>
|
|
</dd>
|
|
<dt><strong><a name="kgost" class="item"><strong>kGOST</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites, using VKO 34.10 key exchange, specified in the <a href="http://www.ietf.org/rfc/rfc4357.txt" class="rfc">RFC 4357</a>.</p>
|
|
</dd>
|
|
<dt><strong><a name="gost94" class="item"><strong>GOST94</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites, using HMAC based on GOST R 34.11-94.</p>
|
|
</dd>
|
|
<dt><strong><a name="gost89mac" class="item"><strong>GOST89MAC</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using GOST 28147-89 MAC <strong>instead of</strong> HMAC.</p>
|
|
</dd>
|
|
<dt><strong><a name="psk" class="item"><strong>PSK</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>All cipher suites using pre-shared keys (PSK).</p>
|
|
</dd>
|
|
<dt><strong><a name="kpsk_kecdhepsk_kdhepsk_krsapsk" class="item"><strong>kPSK</strong>, <strong>kECDHEPSK</strong>, <strong>kDHEPSK</strong>, <strong>kRSAPSK</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using PSK key exchange, ECDHE_PSK, DHE_PSK or RSA_PSK.</p>
|
|
</dd>
|
|
<dt><strong><a name="apsk" class="item"><strong>aPSK</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Cipher suites using PSK authentication (currently all PSK modes apart from
|
|
RSA_PSK).</p>
|
|
</dd>
|
|
<dt><strong><a name="suiteb128_suiteb128only_suiteb192" class="item"><strong>SUITEB128</strong>, <strong>SUITEB128ONLY</strong>, <strong>SUITEB192</strong></a></strong></dt>
|
|
|
|
<dd>
|
|
<p>Enables suite B mode of operation using 128 (permitting 192 bit mode by peer)
|
|
128 bit (not permitting 192 bit by peer) or 192 bit level of security
|
|
respectively.
|
|
If used these cipherstrings should appear first in the cipher
|
|
list and anything after them is ignored.
|
|
Setting Suite B mode has additional consequences required to comply with
|
|
<a href="http://www.ietf.org/rfc/rfc6460.txt" class="rfc">RFC6460</a>.
|
|
In particular the supported signature algorithms is reduced to support only
|
|
ECDSA and SHA256 or SHA384, only the elliptic curves P-256 and P-384 can be
|
|
used and only the two suite B compliant cipher suites
|
|
(ECDHE-ECDSA-AES128-GCM-SHA256 and ECDHE-ECDSA-AES256-GCM-SHA384) are
|
|
permissible.</p>
|
|
</dd>
|
|
</dl>
|
|
<p>
|
|
</p>
|
|
<hr />
|
|
<h1><a name="cipher_suite_names">CIPHER SUITE NAMES</a></h1>
|
|
<p>The following lists give the SSL or TLS cipher suites names from the
|
|
relevant specification and their OpenSSL equivalents. It should be noted,
|
|
that several cipher suite names do not include the authentication used,
|
|
e.g. DES-CBC3-SHA. In these cases, RSA authentication is used.</p>
|
|
<p>
|
|
</p>
|
|
<h2><a name="ssl_v3_0_cipher_suites">SSL v3.0 cipher suites</a></h2>
|
|
<pre>
|
|
SSL_RSA_WITH_NULL_MD5 NULL-MD5
|
|
SSL_RSA_WITH_NULL_SHA NULL-SHA
|
|
SSL_RSA_WITH_RC4_128_MD5 RC4-MD5
|
|
SSL_RSA_WITH_RC4_128_SHA RC4-SHA
|
|
SSL_RSA_WITH_IDEA_CBC_SHA IDEA-CBC-SHA
|
|
SSL_RSA_WITH_3DES_EDE_CBC_SHA DES-CBC3-SHA</pre>
|
|
<pre>
|
|
SSL_DH_DSS_WITH_3DES_EDE_CBC_SHA DH-DSS-DES-CBC3-SHA
|
|
SSL_DH_RSA_WITH_3DES_EDE_CBC_SHA DH-RSA-DES-CBC3-SHA
|
|
SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA DHE-DSS-DES-CBC3-SHA
|
|
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA DHE-RSA-DES-CBC3-SHA</pre>
|
|
<pre>
|
|
SSL_DH_anon_WITH_RC4_128_MD5 ADH-RC4-MD5
|
|
SSL_DH_anon_WITH_3DES_EDE_CBC_SHA ADH-DES-CBC3-SHA</pre>
|
|
<pre>
|
|
SSL_FORTEZZA_KEA_WITH_NULL_SHA Not implemented.
|
|
SSL_FORTEZZA_KEA_WITH_FORTEZZA_CBC_SHA Not implemented.
|
|
SSL_FORTEZZA_KEA_WITH_RC4_128_SHA Not implemented.</pre>
|
|
<p>
|
|
</p>
|
|
<h2><a name="tls_v1_0_cipher_suites">TLS v1.0 cipher suites</a></h2>
|
|
<pre>
|
|
TLS_RSA_WITH_NULL_MD5 NULL-MD5
|
|
TLS_RSA_WITH_NULL_SHA NULL-SHA
|
|
TLS_RSA_WITH_RC4_128_MD5 RC4-MD5
|
|
TLS_RSA_WITH_RC4_128_SHA RC4-SHA
|
|
TLS_RSA_WITH_IDEA_CBC_SHA IDEA-CBC-SHA
|
|
TLS_RSA_WITH_3DES_EDE_CBC_SHA DES-CBC3-SHA</pre>
|
|
<pre>
|
|
TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA Not implemented.
|
|
TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA Not implemented.
|
|
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA DHE-DSS-DES-CBC3-SHA
|
|
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA DHE-RSA-DES-CBC3-SHA</pre>
|
|
<pre>
|
|
TLS_DH_anon_WITH_RC4_128_MD5 ADH-RC4-MD5
|
|
TLS_DH_anon_WITH_3DES_EDE_CBC_SHA ADH-DES-CBC3-SHA</pre>
|
|
<p>
|
|
</p>
|
|
<h2><a name="aes_cipher_suites_from_rfc3268__extending_tls_v1_0">AES cipher suites from <a href="http://www.ietf.org/rfc/rfc3268.txt" class="rfc">RFC3268</a>, extending TLS v1.0</a></h2>
|
|
<pre>
|
|
TLS_RSA_WITH_AES_128_CBC_SHA AES128-SHA
|
|
TLS_RSA_WITH_AES_256_CBC_SHA AES256-SHA</pre>
|
|
<pre>
|
|
TLS_DH_DSS_WITH_AES_128_CBC_SHA DH-DSS-AES128-SHA
|
|
TLS_DH_DSS_WITH_AES_256_CBC_SHA DH-DSS-AES256-SHA
|
|
TLS_DH_RSA_WITH_AES_128_CBC_SHA DH-RSA-AES128-SHA
|
|
TLS_DH_RSA_WITH_AES_256_CBC_SHA DH-RSA-AES256-SHA</pre>
|
|
<pre>
|
|
TLS_DHE_DSS_WITH_AES_128_CBC_SHA DHE-DSS-AES128-SHA
|
|
TLS_DHE_DSS_WITH_AES_256_CBC_SHA DHE-DSS-AES256-SHA
|
|
TLS_DHE_RSA_WITH_AES_128_CBC_SHA DHE-RSA-AES128-SHA
|
|
TLS_DHE_RSA_WITH_AES_256_CBC_SHA DHE-RSA-AES256-SHA</pre>
|
|
<pre>
|
|
TLS_DH_anon_WITH_AES_128_CBC_SHA ADH-AES128-SHA
|
|
TLS_DH_anon_WITH_AES_256_CBC_SHA ADH-AES256-SHA</pre>
|
|
<p>
|
|
</p>
|
|
<h2><a name="camellia_cipher_suites_from_rfc4132__extending_tls_v1_0">Camellia cipher suites from <a href="http://www.ietf.org/rfc/rfc4132.txt" class="rfc">RFC4132</a>, extending TLS v1.0</a></h2>
|
|
<pre>
|
|
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA CAMELLIA128-SHA
|
|
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA CAMELLIA256-SHA</pre>
|
|
<pre>
|
|
TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA DH-DSS-CAMELLIA128-SHA
|
|
TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA DH-DSS-CAMELLIA256-SHA
|
|
TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA DH-RSA-CAMELLIA128-SHA
|
|
TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA DH-RSA-CAMELLIA256-SHA</pre>
|
|
<pre>
|
|
TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA DHE-DSS-CAMELLIA128-SHA
|
|
TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA DHE-DSS-CAMELLIA256-SHA
|
|
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA DHE-RSA-CAMELLIA128-SHA
|
|
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA DHE-RSA-CAMELLIA256-SHA</pre>
|
|
<pre>
|
|
TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA ADH-CAMELLIA128-SHA
|
|
TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA ADH-CAMELLIA256-SHA</pre>
|
|
<p>
|
|
</p>
|
|
<h2><a name="seed_cipher_suites_from_rfc4162__extending_tls_v1_0">SEED cipher suites from <a href="http://www.ietf.org/rfc/rfc4162.txt" class="rfc">RFC4162</a>, extending TLS v1.0</a></h2>
|
|
<pre>
|
|
TLS_RSA_WITH_SEED_CBC_SHA SEED-SHA</pre>
|
|
<pre>
|
|
TLS_DH_DSS_WITH_SEED_CBC_SHA DH-DSS-SEED-SHA
|
|
TLS_DH_RSA_WITH_SEED_CBC_SHA DH-RSA-SEED-SHA</pre>
|
|
<pre>
|
|
TLS_DHE_DSS_WITH_SEED_CBC_SHA DHE-DSS-SEED-SHA
|
|
TLS_DHE_RSA_WITH_SEED_CBC_SHA DHE-RSA-SEED-SHA</pre>
|
|
<pre>
|
|
TLS_DH_anon_WITH_SEED_CBC_SHA ADH-SEED-SHA</pre>
|
|
<p>
|
|
</p>
|
|
<h2><a name="gost_cipher_suites_from_draft_chudov_cryptopro_cptls__extending_tls_v1_0">GOST cipher suites from draft-chudov-cryptopro-cptls, extending TLS v1.0</a></h2>
|
|
<p>Note: these ciphers require an engine which including GOST cryptographic
|
|
algorithms, such as the <strong>gost</strong> engine, which isn't part of the OpenSSL
|
|
distribution.</p>
|
|
<pre>
|
|
TLS_GOSTR341094_WITH_28147_CNT_IMIT GOST94-GOST89-GOST89
|
|
TLS_GOSTR341001_WITH_28147_CNT_IMIT GOST2001-GOST89-GOST89
|
|
TLS_GOSTR341094_WITH_NULL_GOSTR3411 GOST94-NULL-GOST94
|
|
TLS_GOSTR341001_WITH_NULL_GOSTR3411 GOST2001-NULL-GOST94</pre>
|
|
<p>
|
|
</p>
|
|
<h2><a name="additional_export_1024_and_other_cipher_suites">Additional Export 1024 and other cipher suites</a></h2>
|
|
<p>Note: these ciphers can also be used in SSL v3.</p>
|
|
<pre>
|
|
TLS_DHE_DSS_WITH_RC4_128_SHA DHE-DSS-RC4-SHA</pre>
|
|
<p>
|
|
</p>
|
|
<h2><a name="elliptic_curve_cipher_suites">Elliptic curve cipher suites</a></h2>
|
|
<pre>
|
|
TLS_ECDHE_RSA_WITH_NULL_SHA ECDHE-RSA-NULL-SHA
|
|
TLS_ECDHE_RSA_WITH_RC4_128_SHA ECDHE-RSA-RC4-SHA
|
|
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ECDHE-RSA-DES-CBC3-SHA
|
|
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ECDHE-RSA-AES128-SHA
|
|
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDHE-RSA-AES256-SHA</pre>
|
|
<pre>
|
|
TLS_ECDHE_ECDSA_WITH_NULL_SHA ECDHE-ECDSA-NULL-SHA
|
|
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ECDHE-ECDSA-RC4-SHA
|
|
TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ECDHE-ECDSA-DES-CBC3-SHA
|
|
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ECDHE-ECDSA-AES128-SHA
|
|
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ECDHE-ECDSA-AES256-SHA</pre>
|
|
<pre>
|
|
TLS_ECDH_anon_WITH_NULL_SHA AECDH-NULL-SHA
|
|
TLS_ECDH_anon_WITH_RC4_128_SHA AECDH-RC4-SHA
|
|
TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA AECDH-DES-CBC3-SHA
|
|
TLS_ECDH_anon_WITH_AES_128_CBC_SHA AECDH-AES128-SHA
|
|
TLS_ECDH_anon_WITH_AES_256_CBC_SHA AECDH-AES256-SHA</pre>
|
|
<p>
|
|
</p>
|
|
<h2><a name="tls_v1_2_cipher_suites">TLS v1.2 cipher suites</a></h2>
|
|
<pre>
|
|
TLS_RSA_WITH_NULL_SHA256 NULL-SHA256</pre>
|
|
<pre>
|
|
TLS_RSA_WITH_AES_128_CBC_SHA256 AES128-SHA256
|
|
TLS_RSA_WITH_AES_256_CBC_SHA256 AES256-SHA256
|
|
TLS_RSA_WITH_AES_128_GCM_SHA256 AES128-GCM-SHA256
|
|
TLS_RSA_WITH_AES_256_GCM_SHA384 AES256-GCM-SHA384</pre>
|
|
<pre>
|
|
TLS_DH_RSA_WITH_AES_128_CBC_SHA256 DH-RSA-AES128-SHA256
|
|
TLS_DH_RSA_WITH_AES_256_CBC_SHA256 DH-RSA-AES256-SHA256
|
|
TLS_DH_RSA_WITH_AES_128_GCM_SHA256 DH-RSA-AES128-GCM-SHA256
|
|
TLS_DH_RSA_WITH_AES_256_GCM_SHA384 DH-RSA-AES256-GCM-SHA384</pre>
|
|
<pre>
|
|
TLS_DH_DSS_WITH_AES_128_CBC_SHA256 DH-DSS-AES128-SHA256
|
|
TLS_DH_DSS_WITH_AES_256_CBC_SHA256 DH-DSS-AES256-SHA256
|
|
TLS_DH_DSS_WITH_AES_128_GCM_SHA256 DH-DSS-AES128-GCM-SHA256
|
|
TLS_DH_DSS_WITH_AES_256_GCM_SHA384 DH-DSS-AES256-GCM-SHA384</pre>
|
|
<pre>
|
|
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 DHE-RSA-AES128-SHA256
|
|
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 DHE-RSA-AES256-SHA256
|
|
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 DHE-RSA-AES128-GCM-SHA256
|
|
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DHE-RSA-AES256-GCM-SHA384</pre>
|
|
<pre>
|
|
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 DHE-DSS-AES128-SHA256
|
|
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 DHE-DSS-AES256-SHA256
|
|
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 DHE-DSS-AES128-GCM-SHA256
|
|
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 DHE-DSS-AES256-GCM-SHA384</pre>
|
|
<pre>
|
|
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ECDHE-RSA-AES128-SHA256
|
|
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ECDHE-RSA-AES256-SHA384
|
|
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDHE-RSA-AES128-GCM-SHA256
|
|
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDHE-RSA-AES256-GCM-SHA384</pre>
|
|
<pre>
|
|
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ECDHE-ECDSA-AES128-SHA256
|
|
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ECDHE-ECDSA-AES256-SHA384
|
|
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDHE-ECDSA-AES128-GCM-SHA256
|
|
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDHE-ECDSA-AES256-GCM-SHA384</pre>
|
|
<pre>
|
|
TLS_DH_anon_WITH_AES_128_CBC_SHA256 ADH-AES128-SHA256
|
|
TLS_DH_anon_WITH_AES_256_CBC_SHA256 ADH-AES256-SHA256
|
|
TLS_DH_anon_WITH_AES_128_GCM_SHA256 ADH-AES128-GCM-SHA256
|
|
TLS_DH_anon_WITH_AES_256_GCM_SHA384 ADH-AES256-GCM-SHA384</pre>
|
|
<pre>
|
|
RSA_WITH_AES_128_CCM AES128-CCM
|
|
RSA_WITH_AES_256_CCM AES256-CCM
|
|
DHE_RSA_WITH_AES_128_CCM DHE-RSA-AES128-CCM
|
|
DHE_RSA_WITH_AES_256_CCM DHE-RSA-AES256-CCM
|
|
RSA_WITH_AES_128_CCM_8 AES128-CCM8
|
|
RSA_WITH_AES_256_CCM_8 AES256-CCM8
|
|
DHE_RSA_WITH_AES_128_CCM_8 DHE-RSA-AES128-CCM8
|
|
DHE_RSA_WITH_AES_256_CCM_8 DHE-RSA-AES256-CCM8
|
|
ECDHE_ECDSA_WITH_AES_128_CCM ECDHE-ECDSA-AES128-CCM
|
|
ECDHE_ECDSA_WITH_AES_256_CCM ECDHE-ECDSA-AES256-CCM
|
|
ECDHE_ECDSA_WITH_AES_128_CCM_8 ECDHE-ECDSA-AES128-CCM8
|
|
ECDHE_ECDSA_WITH_AES_256_CCM_8 ECDHE-ECDSA-AES256-CCM8</pre>
|
|
<p>
|
|
</p>
|
|
<h2><a name="aria_cipher_suites_from_rfc6209__extending_tls_v1_2">ARIA cipher suites from <a href="http://www.ietf.org/rfc/rfc6209.txt" class="rfc">RFC6209</a>, extending TLS v1.2</a></h2>
|
|
<p>Note: the CBC modes mentioned in this RFC are not supported.</p>
|
|
<pre>
|
|
TLS_RSA_WITH_ARIA_128_GCM_SHA256 ARIA128-GCM-SHA256
|
|
TLS_RSA_WITH_ARIA_256_GCM_SHA384 ARIA256-GCM-SHA384
|
|
TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 DHE-RSA-ARIA128-GCM-SHA256
|
|
TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 DHE-RSA-ARIA256-GCM-SHA384
|
|
TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256 DHE-DSS-ARIA128-GCM-SHA256
|
|
TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384 DHE-DSS-ARIA256-GCM-SHA384
|
|
TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 ECDHE-ECDSA-ARIA128-GCM-SHA256
|
|
TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 ECDHE-ECDSA-ARIA256-GCM-SHA384
|
|
TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 ECDHE-ARIA128-GCM-SHA256
|
|
TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 ECDHE-ARIA256-GCM-SHA384
|
|
TLS_PSK_WITH_ARIA_128_GCM_SHA256 PSK-ARIA128-GCM-SHA256
|
|
TLS_PSK_WITH_ARIA_256_GCM_SHA384 PSK-ARIA256-GCM-SHA384
|
|
TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256 DHE-PSK-ARIA128-GCM-SHA256
|
|
TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384 DHE-PSK-ARIA256-GCM-SHA384
|
|
TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256 RSA-PSK-ARIA128-GCM-SHA256
|
|
TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384 RSA-PSK-ARIA256-GCM-SHA384</pre>
|
|
<p>
|
|
</p>
|
|
<h2><a name="camellia_hmac_based_cipher_suites_from_rfc6367__extending_tls_v1_2">Camellia HMAC-Based cipher suites from <a href="http://www.ietf.org/rfc/rfc6367.txt" class="rfc">RFC6367</a>, extending TLS v1.2</a></h2>
|
|
<pre>
|
|
TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 ECDHE-ECDSA-CAMELLIA128-SHA256
|
|
TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 ECDHE-ECDSA-CAMELLIA256-SHA384
|
|
TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 ECDHE-RSA-CAMELLIA128-SHA256
|
|
TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 ECDHE-RSA-CAMELLIA256-SHA384</pre>
|
|
<p>
|
|
</p>
|
|
<h2><a name="pre_shared_keying__psk__cipher_suites">Pre-shared keying (PSK) cipher suites</a></h2>
|
|
<pre>
|
|
PSK_WITH_NULL_SHA PSK-NULL-SHA
|
|
DHE_PSK_WITH_NULL_SHA DHE-PSK-NULL-SHA
|
|
RSA_PSK_WITH_NULL_SHA RSA-PSK-NULL-SHA</pre>
|
|
<pre>
|
|
PSK_WITH_RC4_128_SHA PSK-RC4-SHA
|
|
PSK_WITH_3DES_EDE_CBC_SHA PSK-3DES-EDE-CBC-SHA
|
|
PSK_WITH_AES_128_CBC_SHA PSK-AES128-CBC-SHA
|
|
PSK_WITH_AES_256_CBC_SHA PSK-AES256-CBC-SHA</pre>
|
|
<pre>
|
|
DHE_PSK_WITH_RC4_128_SHA DHE-PSK-RC4-SHA
|
|
DHE_PSK_WITH_3DES_EDE_CBC_SHA DHE-PSK-3DES-EDE-CBC-SHA
|
|
DHE_PSK_WITH_AES_128_CBC_SHA DHE-PSK-AES128-CBC-SHA
|
|
DHE_PSK_WITH_AES_256_CBC_SHA DHE-PSK-AES256-CBC-SHA</pre>
|
|
<pre>
|
|
RSA_PSK_WITH_RC4_128_SHA RSA-PSK-RC4-SHA
|
|
RSA_PSK_WITH_3DES_EDE_CBC_SHA RSA-PSK-3DES-EDE-CBC-SHA
|
|
RSA_PSK_WITH_AES_128_CBC_SHA RSA-PSK-AES128-CBC-SHA
|
|
RSA_PSK_WITH_AES_256_CBC_SHA RSA-PSK-AES256-CBC-SHA</pre>
|
|
<pre>
|
|
PSK_WITH_AES_128_GCM_SHA256 PSK-AES128-GCM-SHA256
|
|
PSK_WITH_AES_256_GCM_SHA384 PSK-AES256-GCM-SHA384
|
|
DHE_PSK_WITH_AES_128_GCM_SHA256 DHE-PSK-AES128-GCM-SHA256
|
|
DHE_PSK_WITH_AES_256_GCM_SHA384 DHE-PSK-AES256-GCM-SHA384
|
|
RSA_PSK_WITH_AES_128_GCM_SHA256 RSA-PSK-AES128-GCM-SHA256
|
|
RSA_PSK_WITH_AES_256_GCM_SHA384 RSA-PSK-AES256-GCM-SHA384</pre>
|
|
<pre>
|
|
PSK_WITH_AES_128_CBC_SHA256 PSK-AES128-CBC-SHA256
|
|
PSK_WITH_AES_256_CBC_SHA384 PSK-AES256-CBC-SHA384
|
|
PSK_WITH_NULL_SHA256 PSK-NULL-SHA256
|
|
PSK_WITH_NULL_SHA384 PSK-NULL-SHA384
|
|
DHE_PSK_WITH_AES_128_CBC_SHA256 DHE-PSK-AES128-CBC-SHA256
|
|
DHE_PSK_WITH_AES_256_CBC_SHA384 DHE-PSK-AES256-CBC-SHA384
|
|
DHE_PSK_WITH_NULL_SHA256 DHE-PSK-NULL-SHA256
|
|
DHE_PSK_WITH_NULL_SHA384 DHE-PSK-NULL-SHA384
|
|
RSA_PSK_WITH_AES_128_CBC_SHA256 RSA-PSK-AES128-CBC-SHA256
|
|
RSA_PSK_WITH_AES_256_CBC_SHA384 RSA-PSK-AES256-CBC-SHA384
|
|
RSA_PSK_WITH_NULL_SHA256 RSA-PSK-NULL-SHA256
|
|
RSA_PSK_WITH_NULL_SHA384 RSA-PSK-NULL-SHA384
|
|
PSK_WITH_AES_128_GCM_SHA256 PSK-AES128-GCM-SHA256
|
|
PSK_WITH_AES_256_GCM_SHA384 PSK-AES256-GCM-SHA384</pre>
|
|
<pre>
|
|
ECDHE_PSK_WITH_RC4_128_SHA ECDHE-PSK-RC4-SHA
|
|
ECDHE_PSK_WITH_3DES_EDE_CBC_SHA ECDHE-PSK-3DES-EDE-CBC-SHA
|
|
ECDHE_PSK_WITH_AES_128_CBC_SHA ECDHE-PSK-AES128-CBC-SHA
|
|
ECDHE_PSK_WITH_AES_256_CBC_SHA ECDHE-PSK-AES256-CBC-SHA
|
|
ECDHE_PSK_WITH_AES_128_CBC_SHA256 ECDHE-PSK-AES128-CBC-SHA256
|
|
ECDHE_PSK_WITH_AES_256_CBC_SHA384 ECDHE-PSK-AES256-CBC-SHA384
|
|
ECDHE_PSK_WITH_NULL_SHA ECDHE-PSK-NULL-SHA
|
|
ECDHE_PSK_WITH_NULL_SHA256 ECDHE-PSK-NULL-SHA256
|
|
ECDHE_PSK_WITH_NULL_SHA384 ECDHE-PSK-NULL-SHA384</pre>
|
|
<pre>
|
|
PSK_WITH_CAMELLIA_128_CBC_SHA256 PSK-CAMELLIA128-SHA256
|
|
PSK_WITH_CAMELLIA_256_CBC_SHA384 PSK-CAMELLIA256-SHA384</pre>
|
|
<pre>
|
|
DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 DHE-PSK-CAMELLIA128-SHA256
|
|
DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 DHE-PSK-CAMELLIA256-SHA384</pre>
|
|
<pre>
|
|
RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256 RSA-PSK-CAMELLIA128-SHA256
|
|
RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384 RSA-PSK-CAMELLIA256-SHA384</pre>
|
|
<pre>
|
|
ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 ECDHE-PSK-CAMELLIA128-SHA256
|
|
ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 ECDHE-PSK-CAMELLIA256-SHA384</pre>
|
|
<pre>
|
|
PSK_WITH_AES_128_CCM PSK-AES128-CCM
|
|
PSK_WITH_AES_256_CCM PSK-AES256-CCM
|
|
DHE_PSK_WITH_AES_128_CCM DHE-PSK-AES128-CCM
|
|
DHE_PSK_WITH_AES_256_CCM DHE-PSK-AES256-CCM
|
|
PSK_WITH_AES_128_CCM_8 PSK-AES128-CCM8
|
|
PSK_WITH_AES_256_CCM_8 PSK-AES256-CCM8
|
|
DHE_PSK_WITH_AES_128_CCM_8 DHE-PSK-AES128-CCM8
|
|
DHE_PSK_WITH_AES_256_CCM_8 DHE-PSK-AES256-CCM8</pre>
|
|
<p>
|
|
</p>
|
|
<h2><a name="chacha20_poly1305_cipher_suites__extending_tls_v1_2">ChaCha20-Poly1305 cipher suites, extending TLS v1.2</a></h2>
|
|
<pre>
|
|
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ECDHE-RSA-CHACHA20-POLY1305
|
|
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ECDHE-ECDSA-CHACHA20-POLY1305
|
|
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 DHE-RSA-CHACHA20-POLY1305
|
|
TLS_PSK_WITH_CHACHA20_POLY1305_SHA256 PSK-CHACHA20-POLY1305
|
|
TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256 ECDHE-PSK-CHACHA20-POLY1305
|
|
TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256 DHE-PSK-CHACHA20-POLY1305
|
|
TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256 RSA-PSK-CHACHA20-POLY1305</pre>
|
|
<p>
|
|
</p>
|
|
<h2><a name="tls_v1_3_cipher_suites">TLS v1.3 cipher suites</a></h2>
|
|
<pre>
|
|
TLS_AES_128_GCM_SHA256 TLS_AES_128_GCM_SHA256
|
|
TLS_AES_256_GCM_SHA384 TLS_AES_256_GCM_SHA384
|
|
TLS_CHACHA20_POLY1305_SHA256 TLS_CHACHA20_POLY1305_SHA256
|
|
TLS_AES_128_CCM_SHA256 TLS_AES_128_CCM_SHA256
|
|
TLS_AES_128_CCM_8_SHA256 TLS_AES_128_CCM_8_SHA256</pre>
|
|
<p>
|
|
</p>
|
|
<h2><a name="older_names_used_by_openssl">Older names used by OpenSSL</a></h2>
|
|
<p>The following names are accepted by older releases:</p>
|
|
<pre>
|
|
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA EDH-RSA-DES-CBC3-SHA (DHE-RSA-DES-CBC3-SHA)
|
|
SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA EDH-DSS-DES-CBC3-SHA (DHE-DSS-DES-CBC3-SHA)</pre>
|
|
<p>
|
|
</p>
|
|
<hr />
|
|
<h1><a name="notes">NOTES</a></h1>
|
|
<p>Some compiled versions of OpenSSL may not include all the ciphers
|
|
listed here because some ciphers were excluded at compile time.</p>
|
|
<p>
|
|
</p>
|
|
<hr />
|
|
<h1><a name="examples">EXAMPLES</a></h1>
|
|
<p>Verbose listing of all OpenSSL ciphers including NULL ciphers:</p>
|
|
<pre>
|
|
openssl ciphers -v 'ALL:eNULL'</pre>
|
|
<p>Include all ciphers except NULL and anonymous DH then sort by
|
|
strength:</p>
|
|
<pre>
|
|
openssl ciphers -v 'ALL:!ADH:@STRENGTH'</pre>
|
|
<p>Include all ciphers except ones with no encryption (eNULL) or no
|
|
authentication (aNULL):</p>
|
|
<pre>
|
|
openssl ciphers -v 'ALL:!aNULL'</pre>
|
|
<p>Include only 3DES ciphers and then place RSA ciphers last:</p>
|
|
<pre>
|
|
openssl ciphers -v '3DES:+RSA'</pre>
|
|
<p>Include all RC4 ciphers but leave out those without authentication:</p>
|
|
<pre>
|
|
openssl ciphers -v 'RC4:!COMPLEMENTOFDEFAULT'</pre>
|
|
<p>Include all ciphers with RSA authentication but leave out ciphers without
|
|
encryption.</p>
|
|
<pre>
|
|
openssl ciphers -v 'RSA:!COMPLEMENTOFALL'</pre>
|
|
<p>Set security level to 2 and display all ciphers consistent with level 2:</p>
|
|
<pre>
|
|
openssl ciphers -s -v 'ALL:@SECLEVEL=2'</pre>
|
|
<p>
|
|
</p>
|
|
<hr />
|
|
<h1><a name="see_also">SEE ALSO</a></h1>
|
|
<p><em>openssl(1)</em>,
|
|
<em>openssl-s_client(1)</em>,
|
|
<em>openssl-s_server(1)</em>,
|
|
<em>ssl(7)</em></p>
|
|
<p>
|
|
</p>
|
|
<hr />
|
|
<h1><a name="history">HISTORY</a></h1>
|
|
<p>The <strong>-V</strong> option was added in OpenSSL 1.0.0.</p>
|
|
<p>The <strong>-stdname</strong> is only available if OpenSSL is built with tracing enabled
|
|
(<strong>enable-ssl-trace</strong> argument to Configure) before OpenSSL 1.1.1.</p>
|
|
<p>The <strong>-convert</strong> option was added in OpenSSL 1.1.1.</p>
|
|
<p>
|
|
</p>
|
|
<hr />
|
|
<h1><a name="copyright">COPYRIGHT</a></h1>
|
|
<p>Copyright 2000-2019 The OpenSSL Project Authors. All Rights Reserved.</p>
|
|
<p>Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
this file except in compliance with the License. You can obtain a copy
|
|
in the file LICENSE in the source distribution or at
|
|
<a href="https://www.openssl.org/source/license.html">https://www.openssl.org/source/license.html</a>.</p>
|
|
|
|
</body>
|
|
|
|
</html>
|