Name
tls_ciphers — allowable ciphers for TLS inbound and outbound sessions
Synopsis
tls_ciphers = "DEFAULT"
Description
tls_ciphers
specifies the allowable ciphers for a TLS session. This must be a subset of the available ciphers on the host system. A full list of ciphers can be obtained by running openssl ciphers
from a command shell on the host machine. For more information about the available ciphers see http://www.openssl.org/docs/apps/ciphers.html.
Setting tls_ciphers to "DEFAULT"
is exactly the same as leaving it unset. There is no default value for this option in Momentum. If you don't explicitly set the ciphers, OpenSSL will use "DEFAULT". You can be more specific and disable "low" and "export" encryption cipher suites, using a string such as: tls_ciphers = "DEFAULT:!LOW:!EXP"
.
The meaning of "DEFAULT" depends upon how OpenSSL was built. On Red Hat Enterprise Linux and Red Hat clones, OpenSSL has certain ciphers disabled for patent reasons, and other ciphers disabled because they are insecure. So the "DEFAULT" cipher list varies from one platform to another. To view documentation of ciphers on your system run man ciphers
.
Note
Elliptic Curve DH ciphers are not supported in OpenSSL version 0.98. This version of OpenSSL is commonly shipped by RedHat Enterprise Linux 5.
To specify a number of different ciphers, use the following syntax: TLS_Ciphers = "DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:DHE-RSA-CAMELLIA256-SHA"
.
Scope
tls_ciphers
is valid in the binding, binding_group, domain, ecstream_listener, esmtp_listener, global, http_listener, listen, pathway, pathway_group and peer scopes.