mirror of
https://github.com/QuasarApp/openssl.git
synced 2025-05-05 22:19:40 +00:00
Put DES into "not default" category.
Add CVE to CHANGES Reviewed-by: Emilia Käsper <emilia@openssl.org>
This commit is contained in:
parent
d33726b92e
commit
ef28891bab
5
CHANGES
5
CHANGES
@ -4,8 +4,9 @@
|
|||||||
|
|
||||||
Changes between 1.0.2h and 1.1.0 [xx XXX xxxx]
|
Changes between 1.0.2h and 1.1.0 [xx XXX xxxx]
|
||||||
|
|
||||||
*) Because of the SWEET32 attack, 3DES cipher suites have been disabled by
|
*) To mitigate the SWEET32 attack (CVE-2016-2183), 3DES cipher suites
|
||||||
default like RC4. See the RC4 item below to re-enable both.
|
have been disabled by default and removed from DEFAULT, just like RC4.
|
||||||
|
See the RC4 item below to re-enable both.
|
||||||
[Rich Salz]
|
[Rich Salz]
|
||||||
|
|
||||||
*) The method for finding the storage location for the Windows RAND seed file
|
*) The method for finding the storage location for the Windows RAND seed file
|
||||||
|
22
ssl/s3_lib.c
22
ssl/s3_lib.c
@ -57,7 +57,7 @@
|
|||||||
#define SSL3_NUM_CIPHERS OSSL_NELEM(ssl3_ciphers)
|
#define SSL3_NUM_CIPHERS OSSL_NELEM(ssl3_ciphers)
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* The list of available ciphers, organized into the following
|
* The list of available ciphers, mostly organized into the following
|
||||||
* groups:
|
* groups:
|
||||||
* Always there
|
* Always there
|
||||||
* EC
|
* EC
|
||||||
@ -108,7 +108,7 @@ static SSL_CIPHER ssl3_ciphers[] = {
|
|||||||
SSL_SHA1,
|
SSL_SHA1,
|
||||||
SSL3_VERSION, TLS1_2_VERSION,
|
SSL3_VERSION, TLS1_2_VERSION,
|
||||||
DTLS1_BAD_VER, DTLS1_2_VERSION,
|
DTLS1_BAD_VER, DTLS1_2_VERSION,
|
||||||
SSL_MEDIUM | SSL_FIPS,
|
SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
|
||||||
SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
|
SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
|
||||||
112,
|
112,
|
||||||
168,
|
168,
|
||||||
@ -138,7 +138,7 @@ static SSL_CIPHER ssl3_ciphers[] = {
|
|||||||
SSL_SHA1,
|
SSL_SHA1,
|
||||||
SSL3_VERSION, TLS1_2_VERSION,
|
SSL3_VERSION, TLS1_2_VERSION,
|
||||||
DTLS1_BAD_VER, DTLS1_2_VERSION,
|
DTLS1_BAD_VER, DTLS1_2_VERSION,
|
||||||
SSL_MEDIUM | SSL_FIPS,
|
SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
|
||||||
SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
|
SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
|
||||||
112,
|
112,
|
||||||
168,
|
168,
|
||||||
@ -862,7 +862,7 @@ static SSL_CIPHER ssl3_ciphers[] = {
|
|||||||
SSL_SHA1,
|
SSL_SHA1,
|
||||||
SSL3_VERSION, TLS1_2_VERSION,
|
SSL3_VERSION, TLS1_2_VERSION,
|
||||||
DTLS1_BAD_VER, DTLS1_2_VERSION,
|
DTLS1_BAD_VER, DTLS1_2_VERSION,
|
||||||
SSL_MEDIUM | SSL_FIPS,
|
SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
|
||||||
SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
|
SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
|
||||||
112,
|
112,
|
||||||
168,
|
168,
|
||||||
@ -924,7 +924,7 @@ static SSL_CIPHER ssl3_ciphers[] = {
|
|||||||
SSL_SHA1,
|
SSL_SHA1,
|
||||||
SSL3_VERSION, TLS1_2_VERSION,
|
SSL3_VERSION, TLS1_2_VERSION,
|
||||||
DTLS1_BAD_VER, DTLS1_2_VERSION,
|
DTLS1_BAD_VER, DTLS1_2_VERSION,
|
||||||
SSL_MEDIUM | SSL_FIPS,
|
SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
|
||||||
SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
|
SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
|
||||||
112,
|
112,
|
||||||
168,
|
168,
|
||||||
@ -1201,7 +1201,7 @@ static SSL_CIPHER ssl3_ciphers[] = {
|
|||||||
SSL_SHA1,
|
SSL_SHA1,
|
||||||
SSL3_VERSION, TLS1_2_VERSION,
|
SSL3_VERSION, TLS1_2_VERSION,
|
||||||
DTLS1_BAD_VER, DTLS1_2_VERSION,
|
DTLS1_BAD_VER, DTLS1_2_VERSION,
|
||||||
SSL_MEDIUM | SSL_FIPS,
|
SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
|
||||||
SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
|
SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
|
||||||
112,
|
112,
|
||||||
168,
|
168,
|
||||||
@ -1248,7 +1248,7 @@ static SSL_CIPHER ssl3_ciphers[] = {
|
|||||||
SSL_SHA1,
|
SSL_SHA1,
|
||||||
SSL3_VERSION, TLS1_2_VERSION,
|
SSL3_VERSION, TLS1_2_VERSION,
|
||||||
DTLS1_BAD_VER, DTLS1_2_VERSION,
|
DTLS1_BAD_VER, DTLS1_2_VERSION,
|
||||||
SSL_MEDIUM | SSL_FIPS,
|
SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
|
||||||
SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
|
SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
|
||||||
112,
|
112,
|
||||||
168,
|
168,
|
||||||
@ -1295,7 +1295,7 @@ static SSL_CIPHER ssl3_ciphers[] = {
|
|||||||
SSL_SHA1,
|
SSL_SHA1,
|
||||||
SSL3_VERSION, TLS1_2_VERSION,
|
SSL3_VERSION, TLS1_2_VERSION,
|
||||||
DTLS1_BAD_VER, DTLS1_2_VERSION,
|
DTLS1_BAD_VER, DTLS1_2_VERSION,
|
||||||
SSL_MEDIUM | SSL_FIPS,
|
SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
|
||||||
SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
|
SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
|
||||||
112,
|
112,
|
||||||
168,
|
168,
|
||||||
@ -1613,7 +1613,7 @@ static SSL_CIPHER ssl3_ciphers[] = {
|
|||||||
SSL_SHA1,
|
SSL_SHA1,
|
||||||
SSL3_VERSION, TLS1_2_VERSION,
|
SSL3_VERSION, TLS1_2_VERSION,
|
||||||
DTLS1_BAD_VER, DTLS1_2_VERSION,
|
DTLS1_BAD_VER, DTLS1_2_VERSION,
|
||||||
SSL_MEDIUM | SSL_FIPS,
|
SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
|
||||||
SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
|
SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
|
||||||
112,
|
112,
|
||||||
168,
|
168,
|
||||||
@ -1739,7 +1739,7 @@ static SSL_CIPHER ssl3_ciphers[] = {
|
|||||||
SSL_SHA1,
|
SSL_SHA1,
|
||||||
SSL3_VERSION, TLS1_2_VERSION,
|
SSL3_VERSION, TLS1_2_VERSION,
|
||||||
DTLS1_BAD_VER, DTLS1_2_VERSION,
|
DTLS1_BAD_VER, DTLS1_2_VERSION,
|
||||||
SSL_MEDIUM,
|
SSL_NOT_DEFAULT | SSL_MEDIUM,
|
||||||
SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
|
SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
|
||||||
112,
|
112,
|
||||||
168,
|
168,
|
||||||
@ -1754,7 +1754,7 @@ static SSL_CIPHER ssl3_ciphers[] = {
|
|||||||
SSL_SHA1,
|
SSL_SHA1,
|
||||||
SSL3_VERSION, TLS1_2_VERSION,
|
SSL3_VERSION, TLS1_2_VERSION,
|
||||||
DTLS1_BAD_VER, DTLS1_2_VERSION,
|
DTLS1_BAD_VER, DTLS1_2_VERSION,
|
||||||
SSL_MEDIUM,
|
SSL_NOT_DEFAULT | SSL_MEDIUM,
|
||||||
SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
|
SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
|
||||||
112,
|
112,
|
||||||
168,
|
168,
|
||||||
|
Loading…
x
Reference in New Issue
Block a user