Issue 9687 - olcTLSECName is not required in order to use ECDHE-based cipher suites in OpenSSL
Summary: olcTLSECName is not required in order to use ECDHE-based cipher suites in Ope...
Status: VERIFIED FIXED
Alias: None
Product: OpenLDAP
Classification: Unclassified
Component: documentation (show other issues)
Version: 2.5.7
Hardware: All All
: --- normal
Target Milestone: 2.5.8
Assignee: Howard Chu
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2021-09-11 09:13 UTC by dpa-openldap@aegee.org
Modified: 2021-10-11 17:59 UTC (History)
0 users

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this issue.
Description dpa-openldap@aegee.org 2021-09-11 09:13:19 UTC
SLAPD-CONFIG(5) says that olcTLSECName is used to set the names of the Elliptic Curves.  It does not say, that the option is required, nor does it say what happens, when the option is not set.

https://www.openldap.org/doc/admin25/tls.html#TLS%20Configuration says for TLSECName: This is required in order to use ECDHE-based cipher suites in OpenSSL.

I do not set TLSECName and call

  ./testssl.sh ldap.aegee.org:636
  
which prints:

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)                                                   
-----------------------------------------------------------------------------------------------------------------------------                             
TLSv1 (server order)
 xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA                 
 xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA                 
TLSv1.1 (server order)
 xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA                 
 xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA                 
TLSv1.2 (server order)
 xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 253   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384              
 xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 253   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256        
 xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 253   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256              
 xc028   ECDHE-RSA-AES256-SHA384           ECDH 253   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384              
 xc027   ECDHE-RSA-AES128-SHA256           ECDH 253   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256              
 xc014   ECDHE-RSA-AES256-SHA              ECDH 253   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA                 
 xc013   ECDHE-RSA-AES128-SHA              ECDH 253   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA                 
TLSv1.3 (server order)
 x1302   TLS_AES_256_GCM_SHA384            ECDH 253   AESGCM      256      TLS_AES_256_GCM_SHA384                             
 x1303   TLS_CHACHA20_POLY1305_SHA256      ECDH 253   ChaCha20    256      TLS_CHACHA20_POLY1305_SHA256                       
 x1301   TLS_AES_128_GCM_SHA256            ECDH 253   AESGCM      128      TLS_AES_128_GCM_SHA256                             

 Testing robust forward secrecy (FS) -- omitting Null Authentication/Encryption, 3DES, RC4 

 Elliptic curves offered:     prime256v1 secp384r1 secp521r1 X25519 X448 

This means, that when olcTLSECName is not set, OpenSSL defaults are used, and ECDHE-based cipher suites are still offered.

testssl.sh can be obtianed from https://github.com/drwetter/testssl.sh .
Comment 1 Howard Chu 2021-09-14 16:51:37 UTC
The docs were correct as of the time they were written, in 2013, using OpenSSL 1.0. I guess we can remove that note now that we're using OpenSSL 1.1.1 or newer.
Comment 2 Quanah Gibson-Mount 2021-09-14 17:22:22 UTC
  • a7717ae7 
by Howard Chu at 2021-09-14T17:56:03+01:00 
ITS#9687 TLSECName is no longer required with OpenSSL 1.1+
Comment 3 Quanah Gibson-Mount 2021-09-14 17:24:26 UTC
RE26:

  • 13f35c4d 
by Howard Chu at 2021-09-14T17:22:39+00:00 
ITS#9687 TLSECName is no longer required with OpenSSL 1.1+


RE25:


Commits: 
  • 53a32ae0 
by Howard Chu at 2021-09-14T17:22:48+00:00 
ITS#9687 TLSECName is no longer required with OpenSSL 1.1+
Comment 4 Quanah Gibson-Mount 2021-09-15 15:40:14 UTC
  • 86baf9a5 
by Howard Chu at 2021-09-14T18:54:05+01:00 
ITS#9687 re-fix: refer to OpenSSL docs instead
Comment 5 Quanah Gibson-Mount 2021-09-15 15:54:54 UTC
RE26:

Commits: 
  • 039454b6 
by Howard Chu at 2021-09-15T15:36:30+00:00 
ITS#9687 re-fix: refer to OpenSSL docs instead

RE25:


Commits: 
  • d6810115 
by Howard Chu at 2021-09-15T15:39:55+00:00 
ITS#9687 re-fix: refer to OpenSSL docs instead