Ciphers Used with SSL
798
Managing Servers with Netscape Console • December 2001
Decisions about which cipher suites a particular organization decides to enable
depend on trade-offs among the sensitivity of the data involved, the speed of the
cipher, and the applicability of export rules.
Some organizations may want to disable the weaker ciphers to prevent SSL
connections with weaker encryption. However, due to U.S. government
restrictions on products that support anything stronger than 40-bit encryption,
disabling support for all 40-bit ciphers effectively restricts access to network
browsers that are available only in the United States (unless the server involved
has a special Global Server ID that permits the international client to “step up” to
stronger encryption).
To serve the largest possible range of users, it’s a good idea for administrators to
enable as broad a range of SSL cipher suites as possible. That way, when a domestic
client or server is dealing with another domestic server or client, respectively, it
will negotiate the use of the strongest ciphers available. And when an domestic
client or server is dealing with an international server or client, it will negotiate the
use of those ciphers that are permitted under U.S. export regulations.
However, since 40-bit ciphers can be broken relatively quickly, administrators
whose user communities can use stronger ciphers without violating export
restrictions should disable the 40-bit ciphers if they are concerned about access to
data by eavesdroppers.
•
RC4 with 128-bit encryption and MD5 message authentication
•
RC4 with 40-bit encryption and MD5 message authentication
•
RC2 with 40-bit encryption and MD5 message authentication
•
No encryption, MD5 message authentication only
Cipher Suites With RSA Key Exchange
Table K-1 lists the cipher suites supported by SSL that use the RSA key-exchange
algorithm. Unless otherwise indicated, all ciphers listed in the table are supported
by both SSL 2.0 and SSL 3.0. Cipher suites are listed from strongest to weakest.
NOTE
Netscape Console does not support all of the cipher suites
supported by Netscape clients and servers. To ensure that Netscape
Console can control an SSL-enabled server, the server must enable
at least one of the following cipher suites for SSL 3.0:
Содержание Certificate Management System 6.1
Страница 1: ...Administrator s Guide Netscape Certificate Management System Version6 1 February 2003...
Страница 28: ...Documentation 28 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 68: ...Support for Open Standards 68 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 82: ...Uninstalling CMS 82 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 166: ...How a Registration Manager Works 166 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 382: ...ACL Reference 382 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 566: ...Managing Policy Plug in Modules 566 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 710: ...1 3 Organization Security Policies 710 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 716: ...Object Identifiers 716 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 762: ...DNs in Certificate Management System 762 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 794: ...Managing Certificates 794 Managing Servers with Netscape Console December 2001...
Страница 810: ...The SSL Handshake 810 Managing Servers with Netscape Console December 2001...
Страница 828: ...828 Netscape Certificate Management System Administrator s Guide February 2003...