[Ach] Issue with OpenSSL >0.9.8l <1.0.0
Torsten Gigler
torsten.gigler at owasp.org
Sat Apr 26 14:57:21 CEST 2014
Hi Aaron,
I got some old versions of openssl here: http://sourceforge.net/projects/gnuwin32/files/openssl/
(Yes, it is Windows - but it was really easy ;-) )
Findings:
1) I figured out that most of the mess came from:
D:\tmp\openssl-0.9.7c-bin\bin>openssl ciphers -v "RSA+CAMELLIA+SHA"
ADH-AES256-SHA SSLv3 Kx=DH Au=None Enc=AES(256) Mac=SHA1
DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA Enc=AES(256) Mac=SHA1
DHE-DSS-AES256-SHA SSLv3 Kx=DH Au=DSS Enc=AES(256) Mac=SHA1
AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1
ADH-AES128-SHA SSLv3 Kx=DH Au=None Enc=AES(128) Mac=SHA1
DHE-RSA-AES128-SHA SSLv3 Kx=DH Au=RSA Enc=AES(128) Mac=SHA1
DHE-DSS-AES128-SHA SSLv3 Kx=DH Au=DSS Enc=AES(128) Mac=SHA1
AES128-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1
DHE-DSS-RC4-SHA SSLv3 Kx=DH Au=DSS Enc=RC4(128) Mac=SHA1
EXP1024-DHE-DSS-RC4-SHA SSLv3 Kx=DH(1024) Au=DSS Enc=RC4(56) Mac=SHA1 export
EXP1024-RC4-SHA SSLv3 Kx=RSA(1024) Au=RSA Enc=RC4(56) Mac=SHA1 export
EXP1024-DHE-DSS-DES-CBC-SHA SSLv3 Kx=DH(1024) Au=DSS Enc=DES(56) Mac=SHA1 export
EXP1024-DES-CBC-SHA SSLv3 Kx=RSA(1024) Au=RSA Enc=DES(56) Mac=SHA1 export
EDH-RSA-DES-CBC3-SHA SSLv3 Kx=DH Au=RSA Enc=3DES(168) Mac=SHA1
EDH-RSA-DES-CBC-SHA SSLv3 Kx=DH Au=RSA Enc=DES(56) Mac=SHA1
EXP-EDH-RSA-DES-CBC-SHA SSLv3 Kx=DH(512) Au=RSA Enc=DES(40) Mac=SHA1 export
EDH-DSS-DES-CBC3-SHA SSLv3 Kx=DH Au=DSS Enc=3DES(168) Mac=SHA1
EDH-DSS-DES-CBC-SHA SSLv3 Kx=DH Au=DSS Enc=DES(56) Mac=SHA1
EXP-EDH-DSS-DES-CBC-SHA SSLv3 Kx=DH(512) Au=DSS Enc=DES(40) Mac=SHA1 export
DES-CBC3-SHA SSLv3 Kx=RSA Au=RSA Enc=3DES(168) Mac=SHA1
DES-CBC-SHA SSLv3 Kx=RSA Au=RSA Enc=DES(56) Mac=SHA1
EXP-DES-CBC-SHA SSLv3 Kx=RSA(512) Au=RSA Enc=DES(40) Mac=SHA1 export
IDEA-CBC-SHA SSLv3 Kx=RSA Au=RSA Enc=IDEA(128) Mac=SHA1
RC4-SHA SSLv3 Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1
ADH-DES-CBC3-SHA SSLv3 Kx=DH Au=None Enc=3DES(168) Mac=SHA1
ADH-DES-CBC-SHA SSLv3 Kx=DH Au=None Enc=DES(56) Mac=SHA1
EXP-ADH-DES-CBC-SHA SSLv3 Kx=DH(512) Au=None Enc=DES(40) Mac=SHA1 export
NULL-SHA SSLv3 Kx=RSA Au=RSA Enc=None Mac=SHA1
-> A switch to openssl ciphers -v "CAMELLIA128-SHA" helped, openssl ciphers -v
"RSA+CAMELLIA+SHA:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!DSS:!RC4:!SEED:!ECDSA:!ADH:!IDEA", too
2) Unexpected result with EECDH:
D:\tmp\openssl-0.9.7c-bin\bin>openssl ciphers -v "EECDH+aRSA+AES"
DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA Enc=AES(256) Mac=SHA1
AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1
DHE-RSA-AES128-SHA SSLv3 Kx=DH Au=RSA Enc=AES(128) Mac=SHA1
AES128-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1
-> I fixed this by adding ':-DHE-RSA-AES128-SHA' at the end (so 'DHE-RSA-AES128-SHA256' could be
shortened to 'EDH+aRSA+AES'), the other ciphers were welcomed anyway
(Perhaps this is unnecessary as this old version perhaps does not support DH-Keys >1024Bits...)
==> Result:
This Cipher String works here now for 1.0.1g/e, 0.9.8h, 0.9.7c (for Win32 Versions) as far as the
suggested Ciphers are available, including the Preference:
openssl ciphers -v
"EDH+aRSA+AESGCM:EDH+aRSA+AES256:DHE-RSA-AES256-SHA:EDH+aRSA+CAMELLIA256:EDH+aRSA+AES:EDH+aRSA+CAMELLIA:EECDH+aRSA+AESGCM:EECDH+aRSA+AES:RSA+AESGCM:AES256-SHA:CAMELLIA256-SHA:AES128-SHA:CAMELLIA128-SHA:-DHE-RSA-AES128-SHA"
or:
openssl ciphers -v
"EDH+aRSA+AESGCM:EDH+aRSA+AES256:DHE-RSA-AES256-SHA:EDH+aRSA+CAMELLIA256:EDH+aRSA+AES:EDH+aRSA+CAMELLIA:EECDH+aRSA+AESGCM:EECDH+aRSA+AES:RSA+AESGCM:AES256-SHA:CAMELLIA256-SHA:AES128-SHA:CAMELLIA128-SHA:-DHE-RSA-AES128-SHA:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!DSS:!RC4:!SEED:!ECDSA:!ADH:!IDEA"
with the same results:
OpenSSL 1.0.1g 7 Apr 2014 / OpenSSL 1.0.1e 11 Feb 2013: openssl ciphers -V ...
0x00,0x9F - DHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(256) Mac=AEAD
0x00,0x9E - DHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(128) Mac=AEAD
0x00,0x6B - DHE-RSA-AES256-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(256) Mac=SHA256
0x00,0x39 - DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA Enc=AES(256) Mac=SHA1
0x00,0x88 - DHE-RSA-CAMELLIA256-SHA SSLv3 Kx=DH Au=RSA Enc=Camellia(256) Mac=SHA1
0x00,0x67 - DHE-RSA-AES128-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(128) Mac=SHA256
0x00,0x45 - DHE-RSA-CAMELLIA128-SHA SSLv3 Kx=DH Au=RSA Enc=Camellia(128) Mac=SHA1
0xC0,0x30 - ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD
0xC0,0x2F - ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(128) Mac=AEAD
0xC0,0x28 - ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA384
0xC0,0x14 - ECDHE-RSA-AES256-SHA SSLv3 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA1
0xC0,0x27 - ECDHE-RSA-AES128-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA256
0xC0,0x13 - ECDHE-RSA-AES128-SHA SSLv3 Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA1
0x00,0x9D - AES256-GCM-SHA384 TLSv1.2 Kx=RSA Au=RSA Enc=AESGCM(256) Mac=AEAD
0x00,0x9C - AES128-GCM-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AESGCM(128) Mac=AEAD
0x00,0x35 - AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1
0x00,0x84 - CAMELLIA256-SHA SSLv3 Kx=RSA Au=RSA Enc=Camellia(256) Mac=SHA1
0x00,0x2F - AES128-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1
0x00,0x41 - CAMELLIA128-SHA SSLv3 Kx=RSA Au=RSA Enc=Camellia(128) Mac=SHA1
OpenSSL 0.9.8h 28 May 2008:
DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA Enc=AES(256) Mac=SHA1
AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1
AES128-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1
OpenSSL 0.9.7c 30 Sep 2003:
DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA Enc=AES(256) Mac=SHA1
AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1
AES128-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1
Does this work for all your versions, too? Is there any difference using quotation marks (",') at
the begin and end of the cipher string?
Kind regards
Torsten
Am 25.04.2014 20:01, schrieb Aaron Zauner:
> On 04/25/2014 06:29 PM, Torsten Gigler wrote:
>> Aaron,
>>
>> Preference is also screwed:
>> No idea, Is this already supported in 0.9.7a? You need at least ssl3
>> for any preference.
> It should be, yes.
>> Kind regards
>> Torsten
>>
>> PS: The second string should be (the 2nd openssl deleted):
>> openssl ciphers -v
>> DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:DHE-RSA-CAMELLIA256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:DHE-RSA-CAMELLIA128-SHA:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA:CAMELLIA256-SHA:AES128-SHA:CAMELLIA128-SHA
> Hm. theres still our preference missing (+) and all of the blacklisted
> ciphers (!).
>
>
> Aaron
>> 2014-04-25 17:49 GMT+02:00 Torsten Gigler <torsten.gigler at owasp.org
>> <mailto:torsten.gigler at owasp.org>>:
>>
>> Hi Aaron,
>>
>> yes, I see, that was not intended, sorry. I do not have such old
>> versions of openssl to check it...
>> Are there any servers publically avilable where this could be checked?
>>
>> What happens if you restore the Deny-Rules and Add !ADH?
>>
>> openssl ciphers -v
>> EDH+aRSA+AESGCM:EDH+aRSA+AES256:DHE-RSA-AES256-SHA:EDH+aRSA+CAMELLIA256:DHE-RSA-AES128-SHA256:EDH+aRSA+CAMELLIA:EECDH+aRSA+AESGCM:EECDH+aRSA+AES:RSA+AESGCM:AES256-SHA:CAMELLIA256-SHA:RSA+AES+SHA:RSA+CAMELLIA+SHA:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!DSS:!RC4:!SEED:!ECDSA:!ADH
>>
>>
>> Does this work?
>>
>> If not, you could make a list of all supported ciphers (if this
>> does not get too long...)
>> openssl ciphers -v openssl
>> DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:DHE-RSA-CAMELLIA256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:DHE-RSA-CAMELLIA128-SHA:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA:CAMELLIA256-SHA:AES128-SHA:CAMELLIA128-SHA
>>
>> For 0.9.8 this could get something like this:
>> DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA Enc=AES(256)
>> Mac=SHA1
>> ECDHE-RSA-AES256-SHA SSLv3 Kx=ECDH Au=RSA Enc=AES(256)
>> Mac=SHA1
>> ECDHE-RSA-AES128-SHA SSLv3 Kx=ECDH Au=RSA Enc=AES(128)
>> Mac=SHA1
>> AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256)
>> Mac=SHA1
>> AES128-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(128)
>> Mac=SHA1
>>
>> Performance:
>> Yes, DHE needs much more CPU load than ECDHE (I read about 3
>> times), but it is more secure...
>>
>> Kind regards
>> Torsten
>>
>> 2014-04-25 16:58 GMT+02:00 Aaron Zauner <azet at azet.org
>> <mailto:azet at azet.org>>:
>>
>> Hi Torsten,
>>
>> I've checked with various oder versions of OpenSSL. As you
>> have removed the trailing part of our Ciphersuite spec, export
>> and crap ciphers would now be possible:
>>
>> ```
>> azet at orpheus ~/openssl/openssl-0.9.7a/apps % ./openssl ciphers
>> EDH+aRSA+AESGCM:EDH+aRSA+AES256:DHE-RSA-AES256-SHA:EDH+aRSA+CAMELLIA256:DHE-RSA-AES128-SHA256:EDH+aRSA+CAMELLIA:EECDH+aRSA+AESGCM:EECDH+aRSA+AES:RSA+AESGCM:AES256-SHA:CAMELLIA256-SHA:RSA+AES+SHA:RSA+CAMELLIA+SHA
>> -v
>> DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA Enc=AES(256)
>> Mac=SHA1
>> AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256)
>> Mac=SHA1
>> DHE-RSA-AES128-SHA SSLv3 Kx=DH Au=RSA Enc=AES(128)
>> Mac=SHA1
>> AES128-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(128)
>> Mac=SHA1
>> ADH-AES256-SHA SSLv3 Kx=DH Au=None Enc=AES(256)
>> Mac=SHA1
>> DHE-DSS-AES256-SHA SSLv3 Kx=DH Au=DSS Enc=AES(256)
>> Mac=SHA1
>> ADH-AES128-SHA SSLv3 Kx=DH Au=None Enc=AES(128)
>> Mac=SHA1
>> DHE-DSS-AES128-SHA SSLv3 Kx=DH Au=DSS Enc=AES(128)
>> Mac=SHA1
>> DHE-DSS-RC4-SHA SSLv3 Kx=DH Au=DSS Enc=RC4(128)
>> Mac=SHA1
>> EXP1024-DHE-DSS-RC4-SHA SSLv3 Kx=DH(1024) Au=DSS Enc=RC4(56)
>> Mac=SHA1 export
>> EXP1024-RC4-SHA SSLv3 Kx=RSA(1024) Au=RSA Enc=RC4(56)
>> Mac=SHA1 export
>> EXP1024-DHE-DSS-DES-CBC-SHA SSLv3 Kx=DH(1024) Au=DSS
>> Enc=DES(56) Mac=SHA1 export
>> EXP1024-DES-CBC-SHA SSLv3 Kx=RSA(1024) Au=RSA Enc=DES(56)
>> Mac=SHA1 export
>> EDH-RSA-DES-CBC3-SHA SSLv3 Kx=DH Au=RSA
>> Enc=3DES(168) Mac=SHA1
>> EDH-RSA-DES-CBC-SHA SSLv3 Kx=DH Au=RSA Enc=DES(56)
>> Mac=SHA1
>> EXP-EDH-RSA-DES-CBC-SHA SSLv3 Kx=DH(512) Au=RSA Enc=DES(40)
>> Mac=SHA1 export
>> EDH-DSS-DES-CBC3-SHA SSLv3 Kx=DH Au=DSS
>> Enc=3DES(168) Mac=SHA1
>> EDH-DSS-DES-CBC-SHA SSLv3 Kx=DH Au=DSS Enc=DES(56)
>> Mac=SHA1
>> EXP-EDH-DSS-DES-CBC-SHA SSLv3 Kx=DH(512) Au=DSS Enc=DES(40)
>> Mac=SHA1 export
>> DES-CBC3-SHA SSLv3 Kx=RSA Au=RSA
>> Enc=3DES(168) Mac=SHA1
>> DES-CBC-SHA SSLv3 Kx=RSA Au=RSA Enc=DES(56)
>> Mac=SHA1
>> EXP-DES-CBC-SHA SSLv3 Kx=RSA(512) Au=RSA Enc=DES(40)
>> Mac=SHA1 export
>> IDEA-CBC-SHA SSLv3 Kx=RSA Au=RSA
>> Enc=IDEA(128) Mac=SHA1
>> RC4-SHA SSLv3 Kx=RSA Au=RSA Enc=RC4(128)
>> Mac=SHA1
>> ADH-DES-CBC3-SHA SSLv3 Kx=DH Au=None
>> Enc=3DES(168) Mac=SHA1
>> ADH-DES-CBC-SHA SSLv3 Kx=DH Au=None Enc=DES(56)
>> Mac=SHA1
>> EXP-ADH-DES-CBC-SHA SSLv3 Kx=DH(512) Au=None Enc=DES(40)
>> Mac=SHA1 export
>> NULL-SHA SSLv3 Kx=RSA Au=RSA Enc=None
>> Mac=SHA1
>> azet at orpheus ~/openssl/openssl-0.9.7a/apps % ./openssl version
>> OpenSSL 0.9.7a Feb 19 2003
>> ```
>> Preference is also screwed.
>>
>> We're entirely missing this part here:
>> "+CAMELLIA256:+AES256:+CAMELLIA128:+AES128:+SSLv3:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!DSS:!RC4:!SEED:!ECDSA:"
>> (Why is there +SSLv3 in there, btw?)
>>
>> Aaron
>>
>>
>> On Fri, Apr 25, 2014 at 3:47 PM, Torsten Gigler
>> <torsten.gigler at owasp.org <mailto:torsten.gigler at owasp.org>>
>> wrote:
>>
>> Hi,
>>
>> Have you tried to add ':DHE-RSA-AES256-SHA' in the Cipher
>> String?
>> Here my suggestion:
>>
>> openssl ciphers -V
>> EDH+aRSA+AESGCM:EDH+aRSA+AES256:DHE-RSA-AES256-SHA:EDH+aRSA+CAMELLIA256:DHE-RSA-AES128-SHA256:EDH+aRSA+CAMELLIA:EECDH+aRSA+AESGCM:EECDH+aRSA+AES:RSA+AESGCM:AES256-SHA:CAMELLIA256-SHA:RSA+AES+SHA:RSA+CAMELLIA+SHA
>> 0x00,0x9F - DHE-RSA-AES256-GCM-SHA384 TLSv1.2
>> Kx=DH Au=RSA Enc=AESGCM(256) Mac=AEAD
>> 0x00,0x9E - DHE-RSA-AES128-GCM-SHA256 TLSv1.2
>> Kx=DH Au=RSA Enc=AESGCM(128) Mac=AEAD
>> 0x00,0x6B - DHE-RSA-AES256-SHA256 TLSv1.2
>> Kx=DH Au=RSA Enc=AES(256) Mac=SHA256
>> 0x00,0x39 - DHE-RSA-AES256-SHA SSLv3
>> Kx=DH Au=RSA Enc=AES(256) Mac=SHA1
>> 0x00,0x88 - DHE-RSA-CAMELLIA256-SHA SSLv3
>> Kx=DH Au=RSA Enc=Camellia(256) Mac=SHA1
>> 0x00,0x67 - DHE-RSA-AES128-SHA256 TLSv1.2
>> Kx=DH Au=RSA Enc=AES(128) Mac=SHA256
>> 0x00,0x45 - DHE-RSA-CAMELLIA128-SHA SSLv3
>> Kx=DH Au=RSA Enc=Camellia(128) Mac=SHA1
>> 0xC0,0x30 - ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2
>> Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD
>> 0xC0,0x2F - ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2
>> Kx=ECDH Au=RSA Enc=AESGCM(128) Mac=AEAD
>> 0xC0,0x28 - ECDHE-RSA-AES256-SHA384 TLSv1.2
>> Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA384
>> 0xC0,0x14 - ECDHE-RSA-AES256-SHA SSLv3
>> Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA1
>> 0xC0,0x27 - ECDHE-RSA-AES128-SHA256 TLSv1.2
>> Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA256
>> 0xC0,0x13 - ECDHE-RSA-AES128-SHA SSLv3
>> Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA1
>> 0x00,0x9D - AES256-GCM-SHA384 TLSv1.2
>> Kx=RSA Au=RSA Enc=AESGCM(256) Mac=AEAD
>> 0x00,0x9C - AES128-GCM-SHA256 TLSv1.2
>> Kx=RSA Au=RSA Enc=AESGCM(128) Mac=AEAD
>> 0x00,0x35 - AES256-SHA SSLv3
>> Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1
>> 0x00,0x84 - CAMELLIA256-SHA SSLv3
>> Kx=RSA Au=RSA Enc=Camellia(256) Mac=SHA1
>> 0x00,0x2F - AES128-SHA SSLv3
>> Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1
>> 0x00,0x41 - CAMELLIA128-SHA SSLv3
>> Kx=RSA Au=RSA Enc=Camellia(128) Mac=SHA1
>>
>> Remarks:
>> - I changed the order of the ciphers (= Priority of the
>> ciphers a server chooses, if 'Server Order' is set),
>> - excluded '0x00,0x33 - DHE-RSA-AES128-SHA' to protect
>> aginst a possible incompatibility for JAVA6+7 & DH-Keys
>> >1024bits
>> - added '0x00,0x9D - AES256-GCM-SHA384' and '0x00,0x9C -
>> AES128-GCM-SHA256' (is there any reason why they weren't
>> included before?)
>>
>> Do you get the following Ciphers with OpenSSL 0.9.8?
>> openssl ciphers -v
>> EDH+aRSA+AESGCM:EDH+aRSA+AES256:DHE-RSA-AES256-SHA:EDH+aRSA+CAMELLIA256:DHE-RSA-AES128-SHA256:EDH+aRSA+CAMELLIA:EECDH+aRSA+AESGCM:EECDH+aRSA+AES:RSA+AESGCM:AES256-SHA:CAMELLIA256-SHA:RSA+AES+SHA:RSA+CAMELLIA+SHA
>> DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA
>> Enc=AES(256) Mac=SHA1
>> AES256-SHA SSLv3 Kx=RSA Au=RSA
>> Enc=AES(256) Mac=SHA1
>> AES128-SHA SSLv3 Kx=RSA Au=RSA
>> Enc=AES(128) Mac=SHA1
>>
>> Kind regards
>> Torsten
>>
>> 2014-04-25 11:15 GMT+02:00 Pepi Zawodsky
>> <pepi.zawodsky at maclemon.at
>> <mailto:pepi.zawodsky at maclemon.at>>:
>>
>>
>> On 25.04.2014, at 04:53, Aaron Zauner <azet at azet.org
>> <mailto:azet at azet.org>> wrote:
>> > as well as older versions of Mac OS X.
>>
>> ALL versions of OS X up to and including the current
>> Mavericks are affected by this.
>> $ /usr/bin/openssl version
>> OpenSSL 0.9.8y 5 Feb 2013
>>
>> Expanding Ciphersuite B results in:
>>
>> $ /usr/bin/openssl ciphers
>> 'EDH+CAMELLIA:EDH+aRSA:EECDH+aRSA+AESGCM:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH:+CAMELLIA256:+AES256:+CAMELLIA128:+AES128:+SSLv3:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!DSS:!RC4:!SEED:!ECDSA:CAMELLIA256-SHA:AES256-SHA:CAMELLIA128-SHA:AES128-SHA'
>>
>> AES256-SHA:AES128-SHA
>>
>> Unexpectedly, DHE ciphers are missing.
>>
>>
>> $ /opt/local/bin/openssl version
>> OpenSSL 1.0.1g 7 Apr 2014
>>
>> $ /opt/local/bin/openssl ciphers
>> 'EDH+CAMELLIA:EDH+aRSA:EECDH+aRSA+AESGCM:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH:+CAMELLIA256:+AES256:+CAMELLIA128:+AES128:+SSLv3:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!DSS:!RC4:!SEED:!ECDSA:CAMELLIA256-SHA:AES256-SHA:CAMELLIA128-SHA:AES128-SHA'
>>
>> DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-CAMELLIA256-SHA:DHE-RSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-CAMELLIA128-SHA:DHE-RSA-AES128-SHA:ECDHE-RSA-AES128-SHA:CAMELLIA256-SHA:AES256-SHA:CAMELLIA128-SHA:AES128-SHA
>>
>> Best regards
>> Pepi
>>
>> _______________________________________________
>> Ach mailing list
>> Ach at lists.cert.at <mailto:Ach at lists.cert.at>
>> http://lists.cert.at/cgi-bin/mailman/listinfo/ach
>>
>>
>>
>> _______________________________________________
>> Ach mailing list
>> Ach at lists.cert.at <mailto:Ach at lists.cert.at>
>> http://lists.cert.at/cgi-bin/mailman/listinfo/ach
>>
>>
>>
>>
More information about the Ach
mailing list