summaryrefslogtreecommitdiffstats
path: root/lib/libtls/tls_config.c
diff options
context:
space:
mode:
authorjsing <jsing@openbsd.org>2015-02-22 14:50:41 +0000
committerjsing <jsing@openbsd.org>2015-02-22 14:50:41 +0000
commit85f64a89748b46b713def1004eded57a7aff1fad (patch)
treef483656830b13e28c073cac5ede934ea8a0099b3 /lib/libtls/tls_config.c
parentCorrect PAGE_MASK usage in radeon_vm_map_gart(). Linux defines (diff)
downloadwireguard-openbsd-85f64a89748b46b713def1004eded57a7aff1fad.tar.xz
wireguard-openbsd-85f64a89748b46b713def1004eded57a7aff1fad.zip
In the interests of being secure by default, make the default TLS ciphers
be those that are TLSv1.2 with AEAD and PFS. Provide a "compat" mode that allows the previous default ciphers to be selected. Discussed with tedu@ during s2k15.
Diffstat (limited to 'lib/libtls/tls_config.c')
-rw-r--r--lib/libtls/tls_config.c14
1 files changed, 13 insertions, 1 deletions
diff --git a/lib/libtls/tls_config.c b/lib/libtls/tls_config.c
index bec7afcb1b1..80242861c7b 100644
--- a/lib/libtls/tls_config.c
+++ b/lib/libtls/tls_config.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: tls_config.c,v 1.6 2015/02/12 04:35:17 jsing Exp $ */
+/* $OpenBSD: tls_config.c,v 1.7 2015/02/22 14:50:41 jsing Exp $ */
/*
* Copyright (c) 2014 Joel Sing <jsing@openbsd.org>
*
@@ -74,6 +74,10 @@ tls_config_new(void)
}
tls_config_set_dheparams(config, "none");
tls_config_set_ecdhecurve(config, "auto");
+ if (tls_config_set_ciphers(config, "secure") != 0) {
+ tls_config_free(config);
+ return (NULL);
+ }
tls_config_set_protocols(config, TLS_PROTOCOLS_DEFAULT);
tls_config_set_verify_depth(config, 6);
@@ -201,6 +205,14 @@ tls_config_set_cert_mem(struct tls_config *config, const uint8_t *cert,
int
tls_config_set_ciphers(struct tls_config *config, const char *ciphers)
{
+ if (ciphers == NULL ||
+ strcasecmp(ciphers, "default") == 0 ||
+ strcasecmp(ciphers, "secure") == 0)
+ ciphers = TLS_CIPHERS_DEFAULT;
+ else if (strcasecmp(ciphers, "compat") == 0 ||
+ strcasecmp(ciphers, "legacy") == 0)
+ ciphers = TLS_CIPHERS_COMPAT;
+
return set_string(&config->ciphers, ciphers);
}