HP Open Source Security for OpenVMS Volume 2: HP SSL for OpenVMS > OpenSSL Command Line Interface (CLI) Referenceciphers
DESCRIPTIONThe cipherlist command converts OpenSSL cipher lists into ordered SSL cipher preference lists. It can be used as a test tool to determine the appropriate cipherlist. COMMAND OPTIONS
CIPHER LIST FORMATThe cipher list consists of one or more cipher strings separated by colons. Commas or spaces are also acceptable separators but colons are normally used. The actual cipher string can take several different forms. It can consist of a single cipher suite such as RC4-SHA. It can represent a list of cipher suites containing a certain algorithm, or cipher suites of a certain type. For example SHA1 represents all ciphers suites using the digest algorithm SHA1 and SSLv3 represents all SSL v3 algorithms. Lists of cipher suites can be combined in a single cipher string using the + character. This is used as a logical and operation. For example SHA1+DES represents all cipher suites containing the SHA1 and the DES algorithms. Each cipher string can be optionally preceded by the characters !, - or +. If ! is used then the ciphers are permanently deleted from the list. The ciphers deleted can never reappear in the list even if they are explicitly stated. If - is used then the ciphers are deleted from the list, but some or all of the ciphers can be added again by later options. If + is used then the ciphers are moved to the end of the list. This option doesn't add any new ciphers it just moves matching existing ones. If none of these characters is present then the string is just interpreted as a list of ciphers to be appended to the current preference list. If the list includes any ciphers already present they will be ignored: that is they will not moved to the end of the list. Additionally the cipher string @STRENGTH can be used at any point to sort the current cipher list in order of encryption algorithm key length. CIPHER STRINGSThe following is a list of all permitted cipher strings and their meanings.
CIPHER SUITE NAMESThe following lists give the SSL or TLS cipher suites names from the relevant specification and their OpenSSL equivalents. It should be noted, that several cipher suite names do not include the authentication used, e.g. DES-CBC3-SHA. In these cases, RSA authentication is used. SSL v3.0 cipher suites.
TLS v1.0 cipher suites.
AES ciphersuites from RFC3268, extending TLS v1.0
Additional Export 1024 and other cipher suitesNote: these ciphers can also be used in SSL v3.
SSL v2.0 cipher suites.
NOTESThe non-ephemeral DH modes are currently unimplemented in OpenSSL because there is no support for DH certificates. Some compiled versions of OpenSSL may not include all the ciphers listed here because some ciphers were excluded at compile time. EXAMPLESVerbose listing of all OpenSSL ciphers including NULL ciphers:
Include all ciphers except NULL and anonymous DH then sort by strength:
Include only 3DES ciphers and then place RSA ciphers last:
Include all RC4 ciphers but leave out those without authentication:
Include all chiphers with RSA authentication but leave out ciphers without encryption.
|