Go to file
Tomas Mraz 10d3d0df07 Fix regressions from the FIPS randlock patch. 2017-12-06 16:01:20 +01:00
.gitignore minor upstream release 1.0.2k fixing security issues 2017-11-13 09:36:56 +01:00
Makefile.certificate Makefile.certificate should not set serial to 0 by default 2015-12-04 14:36:15 +01:00
README.FIPS Remove obsolete sentence. 2014-02-13 16:17:58 +01:00
README.legacy-settings minor upstream release 1.0.2k fixing security issues 2017-02-06 16:55:26 +01:00
ec_curve.c rebase to 1.0.2 branch 2015-04-23 13:57:26 +02:00
ectest.c minor upstream release 1.0.2g fixing security issues 2016-03-01 17:22:06 +01:00
fixpatch New upstream release from the 1.0.1 branch, ABI compatible 2012-02-07 13:46:42 +01:00
hobble-openssl enable RC5 with permission from Legal 2016-03-07 21:56:55 -06:00
make-dummy-cert - abort if selftests failed and random number generator is polled 2009-06-30 11:17:45 +00:00
openssl-1.0.0-beta4-ca-dir.patch - update to new upstream version, no soname bump needed 2009-11-12 15:51:40 +00:00
openssl-1.0.0-timezone.patch - set UTC timezone on pod2man run (#578842) 2010-04-06 14:35:57 +00:00
openssl-1.0.1c-aliasing.patch do not move libcrypto to /lib 2012-07-13 14:23:34 +02:00
openssl-1.0.1c-perlfind.patch Make it build with new Perl 2012-07-12 00:35:57 +02:00
openssl-1.0.1i-algo-doc.patch new upstream release fixing multiple moderate security issues 2014-08-07 16:00:47 +02:00
openssl-1.0.2a-apps-dgst.patch rebase to 1.0.2 branch 2015-04-23 13:57:26 +02:00
openssl-1.0.2a-compat-symbols.patch rebase to 1.0.2 branch 2015-04-23 13:57:26 +02:00
openssl-1.0.2a-defaults.patch rebase to 1.0.2 branch 2015-04-23 13:57:26 +02:00
openssl-1.0.2a-dtls1-abi.patch rebase to 1.0.2 branch 2015-04-23 13:57:26 +02:00
openssl-1.0.2a-env-zlib.patch rebase to 1.0.2 branch 2015-04-23 13:57:26 +02:00
openssl-1.0.2a-fips-ctor.patch rebase to 1.0.2 branch 2015-04-23 13:57:26 +02:00
openssl-1.0.2a-fips-ec.patch rebase to 1.0.2 branch 2015-04-23 13:57:26 +02:00
openssl-1.0.2a-fips-md5-allow.patch rebase to 1.0.2 branch 2015-04-23 13:57:26 +02:00
openssl-1.0.2a-ipv6-apps.patch rebase to 1.0.2 branch 2015-04-23 13:57:26 +02:00
openssl-1.0.2a-issuer-hash.patch rebase to 1.0.2 branch 2015-04-23 13:57:26 +02:00
openssl-1.0.2a-no-rpath.patch rebase to 1.0.2 branch 2015-04-23 13:57:26 +02:00
openssl-1.0.2a-padlock64.patch rebase to 1.0.2 branch 2015-04-23 13:57:26 +02:00
openssl-1.0.2a-readme-warning.patch rebase to 1.0.2 branch 2015-04-23 13:57:26 +02:00
openssl-1.0.2a-rsa-x931.patch rebase to 1.0.2 branch 2015-04-23 13:57:26 +02:00
openssl-1.0.2a-system-cipherlist.patch Fix enginesdir in libcrypto.pc (#1375361) 2016-09-24 20:36:58 +01:00
openssl-1.0.2a-test-use-localhost.patch rebase to 1.0.2 branch 2015-04-23 13:57:26 +02:00
openssl-1.0.2a-version-add-engines.patch rebase to 1.0.2 branch 2015-04-23 13:57:26 +02:00
openssl-1.0.2a-version.patch rebase to 1.0.2 branch 2015-04-23 13:57:26 +02:00
openssl-1.0.2a-x509.patch rebase to 1.0.2 branch 2015-04-23 13:57:26 +02:00
openssl-1.0.2a-xmpp-starttls.patch rebase to 1.0.2 branch 2015-04-23 13:57:26 +02:00
openssl-1.0.2c-default-paths.patch minor upstream release 1.0.2c fixing multiple security issues 2015-06-15 18:23:46 +02:00
openssl-1.0.2c-ecc-suiteb.patch minor upstream release 1.0.2c fixing multiple security issues 2015-06-15 18:23:46 +02:00
openssl-1.0.2d-secp256k1.patch enable secp256k1 (bz1021898) 2015-08-12 17:07:46 -04:00
openssl-1.0.2e-remove-nistp224.patch remove unimplemented EC method from header (#1289599) 2015-12-08 15:56:50 +01:00
openssl-1.0.2e-rpmbuild.patch minor upstream release 1.0.2e fixing moderate severity security issues 2015-12-04 14:13:59 +01:00
openssl-1.0.2e-speed-doc.patch document some options of openssl speed command 2016-01-15 14:19:55 +01:00
openssl-1.0.2e-wrap-pad.patch minor upstream release 1.0.2e fixing moderate severity security issues 2015-12-04 14:13:59 +01:00
openssl-1.0.2g-disable-sslv2v3.patch minor upstream release 1.0.2g fixing security issues 2016-03-01 17:22:06 +01:00
openssl-1.0.2h-pkgconfig.patch require libcrypto in libssl.pc (#1301301) 2016-06-27 12:09:15 +02:00
openssl-1.0.2i-chil-fixes.patch minor upstream release 1.0.2i fixing security issues 2016-09-22 14:16:05 +02:00
openssl-1.0.2i-enc-fail.patch minor upstream release 1.0.2i fixing security issues 2016-09-22 14:16:05 +02:00
openssl-1.0.2i-enginesdir.patch Fix enginesdir in libcrypto.pc (#1375361) 2016-09-24 20:36:58 +01:00
openssl-1.0.2j-deprecate-algos.patch minor upstream release 1.0.2k fixing security issues 2017-02-06 16:55:26 +01:00
openssl-1.0.2j-downgrade-strength.patch minor upstream release 1.0.2k fixing security issues 2017-02-06 16:55:26 +01:00
openssl-1.0.2j-new-fips-reqs.patch minor upstream release 1.0.2k fixing security issues 2017-02-06 16:55:26 +01:00
openssl-1.0.2k-cc-reqs.patch minor upstream release 1.0.2k fixing security issues 2017-02-06 16:55:26 +01:00
openssl-1.0.2k-fips-randlock.patch Fix regressions from the FIPS randlock patch. 2017-12-06 16:01:20 +01:00
openssl-1.0.2m-fips.patch minor upstream release 1.0.2k fixing security issues 2017-11-13 09:36:56 +01:00
openssl-1.0.2m-krb5keytab.patch minor upstream release 1.0.2k fixing security issues 2017-11-13 09:36:56 +01:00
openssl-1.0.2m-manfix.patch minor upstream release 1.0.2k fixing security issues 2017-11-13 09:36:56 +01:00
openssl-1.0.2m-secure-getenv.patch minor upstream release 1.0.2k fixing security issues 2017-11-13 09:36:56 +01:00
openssl-1.0.2m-trusted-first-doc.patch minor upstream release 1.0.2k fixing security issues 2017-11-13 09:36:56 +01:00
openssl-fips.conf add -fips subpackage that contains the FIPS module files 2013-08-27 16:03:43 +02:00
openssl-thread-test.c - new upstream version 2005-11-08 13:52:29 +00:00
openssl.spec Fix changelog entry. 2017-11-13 10:15:24 +01:00
opensslconf-new-warning.h auto-import openssl-0.9.7a-34 from openssl-0.9.7a-34.src.rpm 2004-09-09 09:49:16 +00:00
opensslconf-new.h minor upstream release 1.0.2f fixing security issues 2016-01-28 17:12:09 +01:00
renew-dummy-cert add script for renewal of a self-signed cert by Philip Prindeville (#871566) 2012-12-21 17:21:50 +01:00
sources minor upstream release 1.0.2k fixing security issues 2017-11-13 09:36:56 +01:00

README.legacy-settings

Guide for legacy support enablement
===================================

To improve security provided by use of OpenSSL especially in context of
TLS connections we regularly review and deprecate algorithms and algorithm
settings which are no longer viewed as secure.

For some of these deprecated algorithms we provide a way for the
system administrator to reenable them.

Deprecated algorithms, protocols and settings in OpenSSL
========================================================

Previous Red Hat Enterprise Linux 7 update releases:

* SSL2 protocol disabled by default.
* Minimum DH group size accepted by SSL/TLS client 768 bits.
* Verification of certificates and signatures using MD5 hash
  disabled.

Red Hat Enterprise Linux 7.4:

* SSL2 protocol support completely disabled (cannot be re-enabled).
* All SSL/TLS export ciphers disabled.
* All SSL/TLS ciphersuites with keys smaller than 128 bits disabled.
* Minimum DH group size accepted by SSL/TLS client 1024 bits.
* Disabled support for verification of certificates and signatures
  using MD2, MD4, MD5, and SHA0 hashes.

Legacy support enablement
=========================

The OpenSSL now supports /etc/pki/tls/legacy-settings configuration file
which can be created by the system administrator which contains lines with
simple Key Value pairs.

The library recognizes the following possible configuration settings in
that file:

LegacySigningMDs md2 md5
MinimumDHBits 512

The LegacySigningMDs option allows reenabling support for verification of
signatures with the specified hash algorithms. These can be any combination
of md2, md4, md5 and sha. (sha represents SHA0 algorithm, not SHA1.) Any
unrecognized algorithms are ignored.

The MinimumDHBits option allows setting of the minimum bit size of DH group
accepted by SSL/TLS client. It can be any value between 512 and 10000.

If the configuration file is not present the built-in defaults (that is the
secure defaults) are used. Any unrecognized lines (with other parameter
names or comments) are ignored.