Module: kamailio Branch: master Commit: 5573fded91a0dc330003ba064e524407d92b2a8a URL: https://github.com/kamailio/kamailio/commit/5573fded91a0dc330003ba064e524407...
Author: Daniel-Constantin Mierla miconda@gmail.com Committer: Daniel-Constantin Mierla miconda@gmail.com Date: 2015-01-02T11:22:21+01:00
tls: refreshed the README
---
Modified: modules/tls/README
---
Diff: https://github.com/kamailio/kamailio/commit/5573fded91a0dc330003ba064e524407... Patch: https://github.com/kamailio/kamailio/commit/5573fded91a0dc330003ba064e524407...
---
diff --git a/modules/tls/README b/modules/tls/README index 713a65e..aaa7b0b 100644 --- a/modules/tls/README +++ b/modules/tls/README @@ -504,25 +504,37 @@ Revoking a certificate and using a CRL Sets the SSL/TLS protocol method. Possible values are: * TLSv1.2 - only TLSv1.2 connections are accepted (available starting with openssl/libssl v1.0.1e) + * TLSv1.1+ - TLSv1.1 or newer (TLSv1.2, ...) connections are accepted + (available starting with openssl/libssl v1.0.1) * TLSv1.1 - only TLSv1.1 connections are accepted (available starting with openssl/libssl v1.0.1) - * TLSv1 - only TLSv1 connections are accepted. This is the default - value. + * TLSv1+ - TLSv1.0 or newer (TLSv1.1, TLSv1.2, ...) connections are + accepted. + * TLSv1 - only TLSv1 (TLSv1.0) connections are accepted. This is the + default value. * SSLv3 - only SSLv3 connections are accepted. Note: you shouldn't use SSLv3 for anything which should be highly secure. * SSLv2 - only SSLv2 connections, for old clients. Note: you shouldn't use SSLv2 for anything which should be highly secure. Newer versions of libssl don't include support for it anymore. - * SSLv23 - any of the SSLv2, SSLv3 and TLSv1 methods will be - accepted, with the following limitation: the initial SSL hello - message must be V2 (in the initial hello all the supported - protocols are advertised enabling switching to a higher and more - secure version). This means connections from SSLv3 or TLSv1 clients - will be accepted. Note: you shouldn't use SSLv2 or SSLv3 for - anything which should be highly secure. - - If rfc3261 conformance is desired, TLSv1 must be used. For - compatibility with older clients SSLv23 is a good option. + * SSLv23 - any of the SSLv2, SSLv3 and TLSv1 or newer methods will be + accepted. + From OpenSSL manual: "A TLS/SSL connection established with these + methods may understand the SSLv3, TLSv1, TLSv1.1 and TLSv1.2 + protocols. If extensions are required (for example server name) a + client will send out TLSv1 client hello messages including + extensions and will indicate that it also understands TLSv1.1, + TLSv1.2 and permits a fallback to SSLv3. A server will support + SSLv3, TLSv1, TLSv1.1 and TLSv1.2 protocols. This is the best + choice when compatibility is a concern." + Note: For older libssl version, this option allows SSLv2, with + hello messages done over SSLv2. You shouldn't use SSLv2 or SSLv3 + for anything which should be highly secure. + + If rfc3261 conformance is desired, at least TLSv1 must be used. For + compatibility with older clients SSLv23 is the option, but again, be + aware of security concerns, SSLv2/3 being considered very insecure by + 2014.
Example 1.3. Set tls_method parameter ...