Skip to content

Commit

Permalink
Merge pull request #291 from gene1wood/add_TLS_DHE_RSA_WITH_CHACHA20_…
Browse files Browse the repository at this point in the history
…POLY1305_SHA256

Add TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 cipher to intermediate configuration
  • Loading branch information
gene1wood authored May 16, 2023
2 parents 3317007 + 59954f9 commit 6a47475
Show file tree
Hide file tree
Showing 2 changed files with 21 additions and 6 deletions.
13 changes: 8 additions & 5 deletions Cipher_Suites.mediawiki
Original file line number Diff line number Diff line change
@@ -1,6 +1,9 @@
= Cipher suite correspondence table =
IANA, OpenSSL and GnuTLS use different naming for the same ciphers. The table below lists each cipher as well as its corresponding Mozilla [[Security/Server Side TLS|Server Side TLS]] compatibility level.

<!-- Modern row color : #9EDB58 -->
<!-- Intermediate row color : #DBC158 -->
<!-- Old row color : #CCCCCC -->
{| class="wikitable sortable"
|-
! scope="col" | Hex
Expand Down Expand Up @@ -340,11 +343,11 @@ IANA, OpenSSL and GnuTLS use different naming for the same ciphers. The table be
| style="background-color: #CCCCCC; font-weight: bold;" | AES128-CCM
|-
! scope=row | 0xCC,0xAA
| style="background-color: #CCCCCC; font-weight: bold; text-align: center;" | 48
| style="background-color: #CCCCCC; font-weight: bold;" | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
| style="background-color: #CCCCCC; font-weight: bold;" | TLS_DHE_RSA_CHACHA20_POLY1305
| style="background-color: #CCCCCC; font-weight: bold;" | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
| style="background-color: #CCCCCC; font-weight: bold;" | DHE-RSA-CHACHA20-POLY1305
| style="background-color: #DBC158; font-weight: bold; text-align: center;" | 48
| style="background-color: #DBC158; font-weight: bold;" | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
| style="background-color: #DBC158; font-weight: bold;" | TLS_DHE_RSA_CHACHA20_POLY1305
| style="background-color: #DBC158; font-weight: bold;" | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
| style="background-color: #DBC158; font-weight: bold;" | DHE-RSA-CHACHA20-POLY1305
|-
! scope=row | 0xC0,0x5D
| style="background-color: #CCCCCC; font-weight: bold; text-align: center;" | 49
Expand Down
14 changes: 13 additions & 1 deletion Server_Side_TLS.mediawiki
Original file line number Diff line number Diff line change
Expand Up @@ -87,6 +87,7 @@ For services with clients that support TLS 1.3 and don't need backward compatibi
* Certificate lifespan: '''90 days'''
* Cipher preference: '''client chooses'''
<!-- This tabular openssl list can be produced by running "openssl ciphers -V" -->
<source>
0x13,0x01 - TLS_AES_128_GCM_SHA256 TLSv1.3 Kx=any Au=any Enc=AESGCM(128) Mac=AEAD
0x13,0x02 - TLS_AES_256_GCM_SHA384 TLSv1.3 Kx=any Au=any Enc=AESGCM(256) Mac=AEAD
Expand All @@ -102,7 +103,7 @@ For services with clients that support TLS 1.3 and don't need backward compatibi
<p style="max-width: 60em;">For services that don't need compatibility with legacy clients such as Windows XP or old versions of OpenSSL. This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with nearly every client released in the last five (or more) years.</p>

* Cipher suites (TLS 1.3): '''TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256'''
* Cipher suites (TLS 1.2): '''ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384'''
* Cipher suites (TLS 1.2): '''ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305'''
* Protocols: '''TLS 1.2, TLS 1.3'''
* TLS curves: '''X25519, prime256v1, secp384r1'''
* Certificate type: '''ECDSA (P-256)''' (recommended), or '''RSA (2048 bits)'''
Expand All @@ -111,6 +112,7 @@ For services with clients that support TLS 1.3 and don't need backward compatibi
* Certificate lifespan: '''90 days''' (recommended) to '''366 days'''
* Cipher preference: '''client chooses'''
<!-- This tabular openssl list can be produced by running "openssl ciphers -V" -->
<source>
0x13,0x01 - TLS_AES_128_GCM_SHA256 TLSv1.3 Kx=any Au=any Enc=AESGCM(128) Mac=AEAD
0x13,0x02 - TLS_AES_256_GCM_SHA384 TLSv1.3 Kx=any Au=any Enc=AESGCM(256) Mac=AEAD
Expand All @@ -123,6 +125,7 @@ For services with clients that support TLS 1.3 and don't need backward compatibi
0xCC,0xA8 - ECDHE-RSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH Au=RSA Enc=CHACHA20/POLY1305(256) Mac=AEAD
0x00,0x9E - DHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(128) Mac=AEAD
0x00,0x9F - DHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(256) Mac=AEAD
0xCC,0xAA - DHE-RSA-CHACHA20-POLY1305 TLSv1.2 Kx=DH Au=RSA Enc=CHACHA20/POLY1305(256) Mac=AEAD
</source>

* Rationale:
Expand Down Expand Up @@ -150,6 +153,7 @@ This configuration is compatible with a number of very old clients, and should b
* Certificate lifespan: '''90 days''' (recommended) to '''366 days'''
* Cipher preference: '''server chooses'''
<!-- This tabular openssl list can be produced by running "openssl ciphers -V" -->
<source>
0x13,0x01 - TLS_AES_128_GCM_SHA256 TLSv1.3 Kx=any Au=any Enc=AESGCM(128) Mac=AEAD
0x13,0x02 - TLS_AES_256_GCM_SHA384 TLSv1.3 Kx=any Au=any Enc=AESGCM(256) Mac=AEAD
Expand Down Expand Up @@ -202,6 +206,14 @@ This configuration is compatible with a number of very old clients, and should b
! Editor
! Changes
|-
| style="text-align: center;" | 5.7
| style="text-align: center;" | Gene Wood
| Add DHE-RSA-CHACHA20-POLY1305 cipher to the Intermediate configuration
|-
| style="text-align: center;" | 5.6
| style="text-align: center;" | April King
| Fixed incorrect cipher ordering for the Intermediate configuration
|-
| style="text-align: center;" | 5.5
| style="text-align: center;" | April King
| Update certificate lifespan to reflect browser policy changes
Expand Down

0 comments on commit 6a47475

Please sign in to comment.