On Mon Dec 08 20:20:44 2014, sdao...@yandex.com wrote:
> Hello,
>
> and finally i propose three new values for the "Protocol" slot of
> SSL_CONF_CTX_cmd(): OLDEST, NEWEST and VULNERABLE.
>

Just to add my 2p to this thread which seems to have veered into rather
different territory...

I don't think it's appropriate to have a "VULNERABLE" option as a protocol
selection value partly because vulnerability rarely affects a whole protocol
version, just aspects of it. You can (for example) restrict yourself to TLS
v1.2 and still do insecure things such as talk to servers with 512 bit RSA keys
or using 256 bit DH parameters.

Your request seems closer to the "security levels" code which is currently only
in the OpenSSL master branch. It will by default reject many things: including
the RSA, DH examples above. An application can increase the security level to
make things stricter (but this will fail for many existing servers so it isn't
the default), disable it completely and handle everything themselves (which is
what previous versions of OpenSSL do) or have finer control using an
application specific callback.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org

_______________________________________________
openssl-dev mailing list
openssl-dev@openssl.org
https://mta.opensslfoundation.net/mailman/listinfo/openssl-dev

Reply via email to