On Sat, Apr 9, 2016, at 12:27 PM, Viktor Dukhovni wrote:
> The most recently removed ciphers are at the front of the list when
> ciphers are restored.  Therefore, "aNULL:-aNULL:ALL:@STRENGTH" is
> different from "ALL:@STRENGTH" in that at any given strength the
> aNULL ciphers are listed first.  There's not much point in enabling
> aNULL ciphers if they are not used when supported at both ends (and
> the client is ignoring any server certificate anyway).
> 
>     % bash
>     $ diff -u \
>       <(openssl ciphers -v ALL:@STRENGTH) \
>       <(openssl ciphers -v aNULL:-aNULL:ALL:@STRENGTH)
...

Ok, that's dense.

I clearly need to read some more.  I simply don't get what the intent of that^ 
is.

I thought 'NULL' were "a bad thing", and that we shouldn't be using them at all.

Digging in various places, I've found a number of examples that had something 
close to

 smtp_tls_ciphers           = medium
 smtpd_tls_ciphers          = medium
 smtp_tls_exclude_ciphers = aDH, aDSS, aECDH, EXPORT, kDHd, kDHr, kECDHe, 
kECDHr, KRB5, LOW, MD5, PSK, RC2, RC5
 smtpd_tls_exclude_ciphers  = EXPORT, IDEA, LOW, MD5, RC2
 smtp_tls_mandatory_ciphers = medium
 smtp_tls_mandatory_ciphers = medium

those^ exclude lists are aggregated of what I've found so far.  I'm reading up 
on each of them.

What I want to get to is to make sure that the "bad" ciphers are NOT 
enable/used.

Since I didn't think we should be using NULL-anything, I expected to see 
'medium' NOT using them at all.

I guess we're not here^, but I still can't understand why we ENABLE them first, 
& why that's a good thing.

Jason

Reply via email to