e665925
Guide for legacy support enablement
e665925
===================================
e665925
e665925
To improve security provided by use of OpenSSL especially in context of
e665925
TLS connections we regularly review and deprecate algorithms and algorithm
e665925
settings which are no longer viewed as secure.
e665925
e665925
For some of these deprecated algorithms we provide a way for the
e665925
system administrator to reenable them.
e665925
e665925
Deprecated algorithms, protocols and settings in OpenSSL
e665925
========================================================
e665925
e665925
Previous Red Hat Enterprise Linux 7 update releases:
e665925
e665925
* SSL2 protocol disabled by default.
e665925
* Minimum DH group size accepted by SSL/TLS client 768 bits.
e665925
* Verification of certificates and signatures using MD5 hash
e665925
  disabled.
e665925
e665925
Red Hat Enterprise Linux 7.4:
e665925
e665925
* SSL2 protocol support completely disabled (cannot be re-enabled).
e665925
* All SSL/TLS export ciphers disabled.
e665925
* All SSL/TLS ciphersuites with keys smaller than 128 bits disabled.
e665925
* Minimum DH group size accepted by SSL/TLS client 1024 bits.
e665925
* Disabled support for verification of certificates and signatures
e665925
  using MD2, MD4, MD5, and SHA0 hashes.
e665925
e665925
Legacy support enablement
e665925
=========================
e665925
e665925
The OpenSSL now supports /etc/pki/tls/legacy-settings configuration file
e665925
which can be created by the system administrator which contains lines with
e665925
simple Key Value pairs.
e665925
e665925
The library recognizes the following possible configuration settings in
e665925
that file:
e665925
e665925
LegacySigningMDs md2 md5
e665925
MinimumDHBits 512
e665925
e665925
The LegacySigningMDs option allows reenabling support for verification of
e665925
signatures with the specified hash algorithms. These can be any combination
e665925
of md2, md4, md5 and sha. (sha represents SHA0 algorithm, not SHA1.) Any
e665925
unrecognized algorithms are ignored.
e665925
e665925
The MinimumDHBits option allows setting of the minimum bit size of DH group
e665925
accepted by SSL/TLS client. It can be any value between 512 and 10000.
e665925
e665925
If the configuration file is not present the built-in defaults (that is the
e665925
secure defaults) are used. Any unrecognized lines (with other parameter
e665925
names or comments) are ignored.