[Date Prev][Date Next] [Chronological] [Thread] [Top]

Re: (ITS#5655) add option for setting minimum TLS/SSL protocol



On Thu, 14 Aug 2008, Michael Ströder wrote:
...
> From my understanding this is what LDAP_OPT_X_TLS_CIPHER_SUITE is for, 
> isn't it? It's directly passed to OpenSSL and can also be used to enable 
> or disable SSLv2, SSLv3 and TLSv1 besides choosing the ciphers itself.

Nope.  The cipher suite list and protocol versions supported are 
orthogonal: even if you include "!SSLv2" in your cipher suite, openssl 
will still send an SSLv2-compatible handshake.  Ditto on the server side: 
when OpenSSL announced a vulnerability in the server SSLv2 handshake code, 
I looked at whether specifying "!SSLv2" in the cipher spec would protect 
the server as a workaround.  Nope: only setting the SSL_OP_NO_SSLv2 option 
or using a SSLv3-only or TLSv1-only method would do it.


> Apache HTTP server does it also that way. See:
> http://httpd.apache.org/docs/2.2/mod/mod_ssl.html#sslciphersuite

They also have the "SSLProtocol" directive, further down on that page.  


Philip Guenther