[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Re: (ITS#5655) add option for setting minimum TLS/SSL protocol
guenther+ldapdev@sendmail.com wrote:
> It's time for SSL version 2.0 to die:
Yupp!
> As a first step, here's a patch against the CVS trunk that adds the ability to
> set the minimum TLS/SSL protocol from the C API (LDAP_OPT_X_TLS_PROTOCOL_MIN),
> the ldap.conf (TLS_PROTOCOL_MIN), and the slapd config
> (TLSProtocolMin/olcTLSProtocolMin). Possible settings are:
> C API ldap_[sg]et_option() ldap.conf/slapd config
> -----------------------------------------------------------
> LDAP_OPT_X_TLS_PROTOCOL_SSLv2 SSLv2
> LDAP_OPT_X_TLS_PROTOCOL_SSLv3 SSLv3
> LDAP_OPT_X_TLS_PROTOCOL_TLSv1_0 TLSv1 OR TLSv1.0
From my understanding this is what LDAP_OPT_X_TLS_CIPHER_SUITE is for,
isn't it? It's directly passed to OpenSSL and can also be used to enable
or disable SSLv2, SSLv3 and TLSv1 besides choosing the ciphers itself.
Apache HTTP server does it also that way. See:
http://httpd.apache.org/docs/2.2/mod/mod_ssl.html#sslciphersuite
This patch could be necessary if different SSL implementations can be
used which have different parameters for this. Still you would have to
set other implementation-specific parameters...
Ciao, Michael.