On Fri, Jun 30, 2006 at 07:19:39AM -0400, Victor Duchovni wrote:

> On Thu, Jun 29, 2006 at 12:28:44PM -0700, Chris Clark wrote:
> 
> > I have written a client program in which I allow the user to configure
> > which cipher groups they want to allow as well as a cipher strength of
> > low, medium, or high.
> > 
> > The problem is I can't find a way of selecting the order in which I
> > want the cipher negotiated. For example if all ciphers are enabled in
> > the configuration, I would perfer if AES is selected during
> > negoitation.
> 
> What real problem is this intended to solve?
> 
> > Currently I specify the group (HIGH/MEDIUM/LOW) and remove some ciphers
> > from a group (IDEA and ADH). I also remove AES at the beginning (Shif
> > +="-AES:") and add it later because if I don't remove AES there is no
> > way to separate AES128 and AES256.
> > (Due to an OpenSSL bug, HIGH selects both AES128 and AES256)
> 
> Is this a real problem? What's wrong with:
> 
>     
> !EXPORT:!LOW:!MEDIUM:DEFAULT:-DHE-RSA-AES128-SHA:-DHE-DSS-AES128-SHA:-AES128-SHA
> 

Sorry, I guess this ("DEFAULT:" should have been first) does not work,
because removing the 128 bit ciphers also removes the 256 bit ciphers.

With:

    $ openssl ciphers -v \
        'DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA:AES128-SHA:@STRENGTH'
    DHE-RSA-AES256-SHA      SSLv3 Kx=DH       Au=RSA  Enc=AES(256)  Mac=SHA1
    DHE-DSS-AES256-SHA      SSLv3 Kx=DH       Au=DSS  Enc=AES(256)  Mac=SHA1
    AES256-SHA              SSLv3 Kx=RSA      Au=RSA  Enc=AES(256)  Mac=SHA1
    DHE-RSA-AES128-SHA      SSLv3 Kx=DH       Au=RSA  Enc=AES(128)  Mac=SHA1
    DHE-DSS-AES128-SHA      SSLv3 Kx=DH       Au=DSS  Enc=AES(128)  Mac=SHA1
    AES128-SHA              SSLv3 Kx=RSA      Au=RSA  Enc=AES(128)  Mac=SHA1

and

    $ openssl ciphers -v \
        'DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:AES256-SHA:@STRENGTH'
    DHE-RSA-AES256-SHA      SSLv3 Kx=DH       Au=RSA  Enc=AES(256)  Mac=SHA1
    DHE-DSS-AES256-SHA      SSLv3 Kx=DH       Au=DSS  Enc=AES(256)  Mac=SHA1
    AES256-SHA              SSLv3 Kx=RSA      Au=RSA  Enc=AES(256)  Mac=SHA1
    DHE-RSA-AES128-SHA      SSLv3 Kx=DH       Au=RSA  Enc=AES(128)  Mac=SHA1
    DHE-DSS-AES128-SHA      SSLv3 Kx=DH       Au=DSS  Enc=AES(128)  Mac=SHA1
    AES128-SHA              SSLv3 Kx=RSA      Au=RSA  Enc=AES(128)  Mac=SHA1

producing the same results you are out of luck, if you want 256 bit AES,
you always also get 128 bit AES. In practice (SSLv3/TLSv1) this is not a
problem, because the client and server always choose the strongest common
cipher.
 
-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to