123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478 |
- =pod
- =head1 NAME
- ciphers - SSL cipher display and cipher list tool.
- =head1 SYNOPSIS
- B<openssl> B<ciphers>
- [B<-v>]
- [B<-V>]
- [B<-ssl2>]
- [B<-ssl3>]
- [B<-tls1>]
- [B<cipherlist>]
- =head1 DESCRIPTION
- The B<ciphers> command converts textual OpenSSL cipher lists into ordered
- SSL cipher preference lists. It can be used as a test tool to determine
- the appropriate cipherlist.
- =head1 COMMAND OPTIONS
- =over 4
- =item B<-v>
- Verbose option. List ciphers with a complete description of
- protocol version (SSLv2 or SSLv3; the latter includes TLS), key exchange,
- authentication, encryption and mac algorithms used along with any key size
- restrictions and whether the algorithm is classed as an "export" cipher.
- Note that without the B<-v> option, ciphers may seem to appear twice
- in a cipher list; this is when similar ciphers are available for
- SSL v2 and for SSL v3/TLS v1.
- =item B<-V>
- Like B<-V>, but include cipher suite codes in output (hex format).
- =item B<-ssl3>
- only include SSL v3 ciphers.
- =item B<-ssl2>
- only include SSL v2 ciphers.
- =item B<-tls1>
- only include TLS v1 ciphers.
- =item B<-h>, B<-?>
- print a brief usage message.
- =item B<cipherlist>
- a cipher list to convert to a cipher preference list. If it is not included
- then the default cipher list will be used. The format is described below.
- =back
- =head1 CIPHER LIST FORMAT
- The cipher list consists of one or more I<cipher strings> separated by colons.
- Commas or spaces are also acceptable separators but colons are normally used.
- The actual cipher string can take several different forms.
- It can consist of a single cipher suite such as B<RC4-SHA>.
- It can represent a list of cipher suites containing a certain algorithm, or
- cipher suites of a certain type. For example B<SHA1> represents all ciphers
- suites using the digest algorithm SHA1 and B<SSLv3> represents all SSL v3
- algorithms.
- Lists of cipher suites can be combined in a single cipher string using the
- B<+> character. This is used as a logical B<and> operation. For example
- B<SHA1+DES> represents all cipher suites containing the SHA1 B<and> the DES
- algorithms.
- Each cipher string can be optionally preceded by the characters B<!>,
- B<-> or B<+>.
- If B<!> is used then the ciphers are permanently deleted from the list.
- The ciphers deleted can never reappear in the list even if they are
- explicitly stated.
- If B<-> is used then the ciphers are deleted from the list, but some or
- all of the ciphers can be added again by later options.
- If B<+> is used then the ciphers are moved to the end of the list. This
- option doesn't add any new ciphers it just moves matching existing ones.
- If none of these characters is present then the string is just interpreted
- as a list of ciphers to be appended to the current preference list. If the
- list includes any ciphers already present they will be ignored: that is they
- will not moved to the end of the list.
- Additionally the cipher string B<@STRENGTH> can be used at any point to sort
- the current cipher list in order of encryption algorithm key length.
- =head1 CIPHER STRINGS
- The following is a list of all permitted cipher strings and their meanings.
- =over 4
- =item B<DEFAULT>
- the default cipher list. This is determined at compile time and, as of OpenSSL
- 0.9.9, is normally B<ALL:!aNULL:!eNULL>. This must be the first cipher string
- specified.
- =item B<COMPLEMENTOFDEFAULT>
- the ciphers included in B<ALL>, but not enabled by default. Currently
- this is B<ADH>. Note that this rule does not cover B<eNULL>, which is
- not included by B<ALL> (use B<COMPLEMENTOFALL> if necessary).
- =item B<ALL>
- all cipher suites except the B<eNULL> ciphers which must be explicitly enabled;
- as of OpenSSL, the B<ALL> cipher suites are reasonably ordered by default
- =item B<COMPLEMENTOFALL>
- the cipher suites not enabled by B<ALL>, currently being B<eNULL>.
- =item B<HIGH>
- "high" encryption cipher suites. This currently means those with key lengths larger
- than 128 bits, and some cipher suites with 128-bit keys.
- =item B<MEDIUM>
- "medium" encryption cipher suites, currently some of those using 128 bit encryption.
- =item B<LOW>
- "low" encryption cipher suites, currently those using 64 or 56 bit encryption algorithms
- but excluding export cipher suites.
- =item B<EXP>, B<EXPORT>
- export encryption algorithms. Including 40 and 56 bits algorithms.
- =item B<EXPORT40>
- 40 bit export encryption algorithms
- =item B<EXPORT56>
- 56 bit export encryption algorithms. In OpenSSL 0.9.8c and later the set of
- 56 bit export ciphers is empty unless OpenSSL has been explicitly configured
- with support for experimental ciphers.
- =item B<eNULL>, B<NULL>
- the "NULL" ciphers that is those offering no encryption. Because these offer no
- encryption at all and are a security risk they are disabled unless explicitly
- included.
- =item B<aNULL>
- the cipher suites offering no authentication. This is currently the anonymous
- DH algorithms. These cipher suites are vulnerable to a "man in the middle"
- attack and so their use is normally discouraged.
- =item B<kRSA>, B<RSA>
- cipher suites using RSA key exchange.
- =item B<kEDH>
- cipher suites using ephemeral DH key agreement.
- =item B<kDHr>, B<kDHd>
- cipher suites using DH key agreement and DH certificates signed by CAs with RSA
- and DSS keys respectively. Not implemented.
- =item B<aRSA>
- cipher suites using RSA authentication, i.e. the certificates carry RSA keys.
- =item B<aDSS>, B<DSS>
- cipher suites using DSS authentication, i.e. the certificates carry DSS keys.
- =item B<aDH>
- cipher suites effectively using DH authentication, i.e. the certificates carry
- DH keys. Not implemented.
- =item B<kFZA>, B<aFZA>, B<eFZA>, B<FZA>
- ciphers suites using FORTEZZA key exchange, authentication, encryption or all
- FORTEZZA algorithms. Not implemented.
- =item B<TLSv1>, B<SSLv3>, B<SSLv2>
- TLS v1.0, SSL v3.0 or SSL v2.0 cipher suites respectively.
- =item B<DH>
- cipher suites using DH, including anonymous DH.
- =item B<ADH>
- anonymous DH cipher suites.
- =item B<AES>
- cipher suites using AES.
- =item B<CAMELLIA>
- cipher suites using Camellia.
- =item B<3DES>
- cipher suites using triple DES.
- =item B<DES>
- cipher suites using DES (not triple DES).
- =item B<RC4>
- cipher suites using RC4.
- =item B<RC2>
- cipher suites using RC2.
- =item B<IDEA>
- cipher suites using IDEA.
- =item B<SEED>
- cipher suites using SEED.
- =item B<MD5>
- cipher suites using MD5.
- =item B<SHA1>, B<SHA>
- cipher suites using SHA1.
- =item B<aGOST>
- cipher suites using GOST R 34.10 (either 2001 or 94) for authenticaction
- (needs an engine supporting GOST algorithms).
- =item B<aGOST01>
- cipher suites using GOST R 34.10-2001 authentication.
- =item B<aGOST94>
- cipher suites using GOST R 34.10-94 authentication (note that R 34.10-94
- standard has been expired so use GOST R 34.10-2001)
- =item B<kGOST>
- cipher suites, using VKO 34.10 key exchange, specified in the RFC 4357.
- =item B<GOST94>
- cipher suites, using HMAC based on GOST R 34.11-94.
- =item B<GOST89MAC>
- cipher suites using GOST 28147-89 MAC B<instead of> HMAC.
- =back
- =head1 CIPHER SUITE NAMES
- The following lists give the SSL or TLS cipher suites names from the
- relevant specification and their OpenSSL equivalents. It should be noted,
- that several cipher suite names do not include the authentication used,
- e.g. DES-CBC3-SHA. In these cases, RSA authentication is used.
- =head2 SSL v3.0 cipher suites.
- SSL_RSA_WITH_NULL_MD5 NULL-MD5
- SSL_RSA_WITH_NULL_SHA NULL-SHA
- SSL_RSA_EXPORT_WITH_RC4_40_MD5 EXP-RC4-MD5
- SSL_RSA_WITH_RC4_128_MD5 RC4-MD5
- SSL_RSA_WITH_RC4_128_SHA RC4-SHA
- SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5 EXP-RC2-CBC-MD5
- SSL_RSA_WITH_IDEA_CBC_SHA IDEA-CBC-SHA
- SSL_RSA_EXPORT_WITH_DES40_CBC_SHA EXP-DES-CBC-SHA
- SSL_RSA_WITH_DES_CBC_SHA DES-CBC-SHA
- SSL_RSA_WITH_3DES_EDE_CBC_SHA DES-CBC3-SHA
- SSL_DH_DSS_EXPORT_WITH_DES40_CBC_SHA Not implemented.
- SSL_DH_DSS_WITH_DES_CBC_SHA Not implemented.
- SSL_DH_DSS_WITH_3DES_EDE_CBC_SHA Not implemented.
- SSL_DH_RSA_EXPORT_WITH_DES40_CBC_SHA Not implemented.
- SSL_DH_RSA_WITH_DES_CBC_SHA Not implemented.
- SSL_DH_RSA_WITH_3DES_EDE_CBC_SHA Not implemented.
- SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA EXP-EDH-DSS-DES-CBC-SHA
- SSL_DHE_DSS_WITH_DES_CBC_SHA EDH-DSS-CBC-SHA
- SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA EDH-DSS-DES-CBC3-SHA
- SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA EXP-EDH-RSA-DES-CBC-SHA
- SSL_DHE_RSA_WITH_DES_CBC_SHA EDH-RSA-DES-CBC-SHA
- SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA EDH-RSA-DES-CBC3-SHA
- SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 EXP-ADH-RC4-MD5
- SSL_DH_anon_WITH_RC4_128_MD5 ADH-RC4-MD5
- SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA EXP-ADH-DES-CBC-SHA
- SSL_DH_anon_WITH_DES_CBC_SHA ADH-DES-CBC-SHA
- SSL_DH_anon_WITH_3DES_EDE_CBC_SHA ADH-DES-CBC3-SHA
- SSL_FORTEZZA_KEA_WITH_NULL_SHA Not implemented.
- SSL_FORTEZZA_KEA_WITH_FORTEZZA_CBC_SHA Not implemented.
- SSL_FORTEZZA_KEA_WITH_RC4_128_SHA Not implemented.
- =head2 TLS v1.0 cipher suites.
- TLS_RSA_WITH_NULL_MD5 NULL-MD5
- TLS_RSA_WITH_NULL_SHA NULL-SHA
- TLS_RSA_EXPORT_WITH_RC4_40_MD5 EXP-RC4-MD5
- TLS_RSA_WITH_RC4_128_MD5 RC4-MD5
- TLS_RSA_WITH_RC4_128_SHA RC4-SHA
- TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 EXP-RC2-CBC-MD5
- TLS_RSA_WITH_IDEA_CBC_SHA IDEA-CBC-SHA
- TLS_RSA_EXPORT_WITH_DES40_CBC_SHA EXP-DES-CBC-SHA
- TLS_RSA_WITH_DES_CBC_SHA DES-CBC-SHA
- TLS_RSA_WITH_3DES_EDE_CBC_SHA DES-CBC3-SHA
- TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA Not implemented.
- TLS_DH_DSS_WITH_DES_CBC_SHA Not implemented.
- TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA Not implemented.
- TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA Not implemented.
- TLS_DH_RSA_WITH_DES_CBC_SHA Not implemented.
- TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA Not implemented.
- TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA EXP-EDH-DSS-DES-CBC-SHA
- TLS_DHE_DSS_WITH_DES_CBC_SHA EDH-DSS-CBC-SHA
- TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA EDH-DSS-DES-CBC3-SHA
- TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA EXP-EDH-RSA-DES-CBC-SHA
- TLS_DHE_RSA_WITH_DES_CBC_SHA EDH-RSA-DES-CBC-SHA
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA EDH-RSA-DES-CBC3-SHA
- TLS_DH_anon_EXPORT_WITH_RC4_40_MD5 EXP-ADH-RC4-MD5
- TLS_DH_anon_WITH_RC4_128_MD5 ADH-RC4-MD5
- TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA EXP-ADH-DES-CBC-SHA
- TLS_DH_anon_WITH_DES_CBC_SHA ADH-DES-CBC-SHA
- TLS_DH_anon_WITH_3DES_EDE_CBC_SHA ADH-DES-CBC3-SHA
- =head2 AES ciphersuites from RFC3268, extending TLS v1.0
- TLS_RSA_WITH_AES_128_CBC_SHA AES128-SHA
- TLS_RSA_WITH_AES_256_CBC_SHA AES256-SHA
- TLS_DH_DSS_WITH_AES_128_CBC_SHA Not implemented.
- TLS_DH_DSS_WITH_AES_256_CBC_SHA Not implemented.
- TLS_DH_RSA_WITH_AES_128_CBC_SHA Not implemented.
- TLS_DH_RSA_WITH_AES_256_CBC_SHA Not implemented.
- TLS_DHE_DSS_WITH_AES_128_CBC_SHA DHE-DSS-AES128-SHA
- TLS_DHE_DSS_WITH_AES_256_CBC_SHA DHE-DSS-AES256-SHA
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA DHE-RSA-AES128-SHA
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA DHE-RSA-AES256-SHA
- TLS_DH_anon_WITH_AES_128_CBC_SHA ADH-AES128-SHA
- TLS_DH_anon_WITH_AES_256_CBC_SHA ADH-AES256-SHA
- =head2 Camellia ciphersuites from RFC4132, extending TLS v1.0
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA CAMELLIA128-SHA
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA CAMELLIA256-SHA
- TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA Not implemented.
- TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA Not implemented.
- TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA Not implemented.
- TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA Not implemented.
- TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA DHE-DSS-CAMELLIA128-SHA
- TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA DHE-DSS-CAMELLIA256-SHA
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA DHE-RSA-CAMELLIA128-SHA
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA DHE-RSA-CAMELLIA256-SHA
- TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA ADH-CAMELLIA128-SHA
- TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA ADH-CAMELLIA256-SHA
- =head2 SEED ciphersuites from RFC4162, extending TLS v1.0
- TLS_RSA_WITH_SEED_CBC_SHA SEED-SHA
- TLS_DH_DSS_WITH_SEED_CBC_SHA Not implemented.
- TLS_DH_RSA_WITH_SEED_CBC_SHA Not implemented.
- TLS_DHE_DSS_WITH_SEED_CBC_SHA DHE-DSS-SEED-SHA
- TLS_DHE_RSA_WITH_SEED_CBC_SHA DHE-RSA-SEED-SHA
- TLS_DH_anon_WITH_SEED_CBC_SHA ADH-SEED-SHA
- =head2 GOST ciphersuites from draft-chudov-cryptopro-cptls, extending TLS v1.0
- Note: these ciphers require an engine which including GOST cryptographic
- algorithms, such as the B<ccgost> engine, included in the OpenSSL distribution.
- TLS_GOSTR341094_WITH_28147_CNT_IMIT GOST94-GOST89-GOST89
- TLS_GOSTR341001_WITH_28147_CNT_IMIT GOST2001-GOST89-GOST89
- TLS_GOSTR341094_WITH_NULL_GOSTR3411 GOST94-NULL-GOST94
- TLS_GOSTR341001_WITH_NULL_GOSTR3411 GOST2001-NULL-GOST94
- =head2 Additional Export 1024 and other cipher suites
- Note: these ciphers can also be used in SSL v3.
- TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA EXP1024-DES-CBC-SHA
- TLS_RSA_EXPORT1024_WITH_RC4_56_SHA EXP1024-RC4-SHA
- TLS_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA EXP1024-DHE-DSS-DES-CBC-SHA
- TLS_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA EXP1024-DHE-DSS-RC4-SHA
- TLS_DHE_DSS_WITH_RC4_128_SHA DHE-DSS-RC4-SHA
- =head2 SSL v2.0 cipher suites.
- SSL_CK_RC4_128_WITH_MD5 RC4-MD5
- SSL_CK_RC4_128_EXPORT40_WITH_MD5 EXP-RC4-MD5
- SSL_CK_RC2_128_CBC_WITH_MD5 RC2-MD5
- SSL_CK_RC2_128_CBC_EXPORT40_WITH_MD5 EXP-RC2-MD5
- SSL_CK_IDEA_128_CBC_WITH_MD5 IDEA-CBC-MD5
- SSL_CK_DES_64_CBC_WITH_MD5 DES-CBC-MD5
- SSL_CK_DES_192_EDE3_CBC_WITH_MD5 DES-CBC3-MD5
- =head1 NOTES
- The non-ephemeral DH modes are currently unimplemented in OpenSSL
- because there is no support for DH certificates.
- Some compiled versions of OpenSSL may not include all the ciphers
- listed here because some ciphers were excluded at compile time.
- =head1 EXAMPLES
- Verbose listing of all OpenSSL ciphers including NULL ciphers:
- openssl ciphers -v 'ALL:eNULL'
- Include all ciphers except NULL and anonymous DH then sort by
- strength:
- openssl ciphers -v 'ALL:!ADH:@STRENGTH'
- Include only 3DES ciphers and then place RSA ciphers last:
- openssl ciphers -v '3DES:+RSA'
- Include all RC4 ciphers but leave out those without authentication:
- openssl ciphers -v 'RC4:!COMPLEMENTOFDEFAULT'
- Include all chiphers with RSA authentication but leave out ciphers without
- encryption.
- openssl ciphers -v 'RSA:!COMPLEMENTOFALL'
- =head1 SEE ALSO
- L<s_client(1)|s_client(1)>, L<s_server(1)|s_server(1)>, L<ssl(3)|ssl(3)>
- =head1 HISTORY
- The B<COMPLENTOFALL> and B<COMPLEMENTOFDEFAULT> selection options
- for cipherlist strings were added in OpenSSL 0.9.7.
- The B<-V> option for the B<ciphers> command was added in OpenSSL 0.9.9.
- =cut
|