diff options
author | Jack Lloyd <[email protected]> | 2020-11-21 15:54:03 -0500 |
---|---|---|
committer | Jack Lloyd <[email protected]> | 2020-11-23 07:16:43 -0500 |
commit | 8c20294f75a60046daebf4b6811cf7f7cecda4e4 (patch) | |
tree | 453d51a5550844bcc5a1955465e493d7194029f7 /doc | |
parent | d6956012d1f2993b27a0be58b098327902a0a7f4 (diff) |
Remove SRP support from TLS
Diffstat (limited to 'doc')
-rw-r--r-- | doc/api_ref/tls.rst | 35 | ||||
-rw-r--r-- | doc/deprecated.rst | 6 |
2 files changed, 10 insertions, 31 deletions
diff --git a/doc/api_ref/tls.rst b/doc/api_ref/tls.rst index fdffeda26..8ed214eb8 100644 --- a/doc/api_ref/tls.rst +++ b/doc/api_ref/tls.rst @@ -282,11 +282,9 @@ available: .. cpp:function:: std::vector<X509_Certificate> peer_cert_chain() Returns the certificate chain of the counterparty. When acting - as a client, this value will be non-empty unless the client's - policy allowed anonymous connections and the server then chose - an anonymous ciphersuite. Acting as a server, this value will - ordinarily be empty, unless the server requested a certificate - and the client responded with one. + as a client, this value will be non-empty. Acting as a server, + this value will ordinarily be empty, unless the server requested + a certificate and the client responded with one. .. cpp:function:: SymmetricKey key_material_export( \ const std::string& label, \ @@ -335,8 +333,8 @@ TLS Clients :ref:`tls_session_managers` for more about session managers. The *credentials_manager* is an interface that will be called to - retrieve any certificates, secret keys, pre-shared keys, or SRP - information; see :doc:`credentials_manager` for more information. + retrieve any certificates, private keys, or pre-shared keys; see + :doc:`credentials_manager` for more information. Use the optional *server_info* to specify the DNS name of the server you are attempting to connect to, if you know it. This helps @@ -698,11 +696,6 @@ information about that session: Returns the certificate chain of the peer - .. cpp:function:: std::string srp_identifier() const - - If an SRP ciphersuite was used, then this is the identifier - that was used for authentication. - .. cpp:function:: bool secure_renegotiation() const Returns ``true`` if the connection was negotiated with the @@ -924,7 +917,7 @@ policy settings from a file. the benefit of post quantum security) so if CECPQ1 is being disabled for traffic overhead reasons, DH should also be avoided. - Also allowed: "RSA", "SRP_SHA", "ECDHE_PSK", "DHE_PSK", "PSK" + Also allowed: "RSA", "ECDHE_PSK", "DHE_PSK", "PSK" .. note:: @@ -936,7 +929,7 @@ policy settings from a file. .. note:: - In order to enable RSA, SRP, or PSK ciphersuites one must also enable + In order to enable RSA or PSK ciphersuites one must also enable authentication method "IMPLICIT", see :cpp:func:`allowed_signature_methods`. .. cpp:function:: std::vector<std::string> allowed_signature_hashes() const @@ -958,19 +951,11 @@ policy settings from a file. Default: "ECDSA", "RSA" - Also allowed (disabled by default): "DSA", "IMPLICIT", "ANONYMOUS" + Also allowed (disabled by default): "IMPLICIT" "IMPLICIT" enables ciphersuites which are authenticated not by a signature but through a side-effect of the key exchange. In particular this setting - is required to enable PSK, SRP, and static RSA ciphersuites. - - "ANONYMOUS" allows purely anonymous DH/ECDH key exchanges. **Enabling this - is not recommended** - - .. note:: - - Both DSA authentication and anonymous DH ciphersuites are deprecated, - and will be removed in a future release. + is required to enable PSK and static RSA ciphersuites. .. cpp:function:: std::vector<Group_Params> key_exchange_groups() const @@ -1132,7 +1117,7 @@ policy settings from a file. .. cpp:function:: bool hide_unknown_users() const - The SRP and PSK suites work using an identifier along with a + The PSK suites work using an identifier along with a shared secret. If this function returns true, when an identifier that the server does not recognize is provided by a client, a random shared secret will be generated in such a way that a diff --git a/doc/deprecated.rst b/doc/deprecated.rst index b651e1afd..0ac159692 100644 --- a/doc/deprecated.rst +++ b/doc/deprecated.rst @@ -40,12 +40,6 @@ in a future major release: - All ciphersuites using static RSA key exchange -- SRP ciphersuites. This is implied by the removal of CBC mode, since - all available SRP ciphersuites use CBC. To avoid use of obsolete - ciphers, it would be better to instead perform a standard TLS - negotiation, then a PAKE authentication within (and bound to) the - TLS channel. - - OCB ciphersuites using 128-bit keys Deprecated Functionality |