xref: /onnv-gate/usr/src/common/openssl/doc/apps/ciphers.pod (revision 2175:b0b2f052a486)
1*2175Sjp161948=pod
2*2175Sjp161948
3*2175Sjp161948=head1 NAME
4*2175Sjp161948
5*2175Sjp161948ciphers - SSL cipher display and cipher list tool.
6*2175Sjp161948
7*2175Sjp161948=head1 SYNOPSIS
8*2175Sjp161948
9*2175Sjp161948B<openssl> B<ciphers>
10*2175Sjp161948[B<-v>]
11*2175Sjp161948[B<-ssl2>]
12*2175Sjp161948[B<-ssl3>]
13*2175Sjp161948[B<-tls1>]
14*2175Sjp161948[B<cipherlist>]
15*2175Sjp161948
16*2175Sjp161948=head1 DESCRIPTION
17*2175Sjp161948
18*2175Sjp161948The B<cipherlist> command converts OpenSSL cipher lists into ordered
19*2175Sjp161948SSL cipher preference lists. It can be used as a test tool to determine
20*2175Sjp161948the appropriate cipherlist.
21*2175Sjp161948
22*2175Sjp161948=head1 COMMAND OPTIONS
23*2175Sjp161948
24*2175Sjp161948=over 4
25*2175Sjp161948
26*2175Sjp161948=item B<-v>
27*2175Sjp161948
28*2175Sjp161948verbose option. List ciphers with a complete description of
29*2175Sjp161948protocol version (SSLv2 or SSLv3; the latter includes TLS), key exchange,
30*2175Sjp161948authentication, encryption and mac algorithms used along with any key size
31*2175Sjp161948restrictions and whether the algorithm is classed as an "export" cipher.
32*2175Sjp161948Note that without the B<-v> option, ciphers may seem to appear twice
33*2175Sjp161948in a cipher list; this is when similar ciphers are available for
34*2175Sjp161948SSL v2 and for SSL v3/TLS v1.
35*2175Sjp161948
36*2175Sjp161948=item B<-ssl3>
37*2175Sjp161948
38*2175Sjp161948only include SSL v3 ciphers.
39*2175Sjp161948
40*2175Sjp161948=item B<-ssl2>
41*2175Sjp161948
42*2175Sjp161948only include SSL v2 ciphers.
43*2175Sjp161948
44*2175Sjp161948=item B<-tls1>
45*2175Sjp161948
46*2175Sjp161948only include TLS v1 ciphers.
47*2175Sjp161948
48*2175Sjp161948=item B<-h>, B<-?>
49*2175Sjp161948
50*2175Sjp161948print a brief usage message.
51*2175Sjp161948
52*2175Sjp161948=item B<cipherlist>
53*2175Sjp161948
54*2175Sjp161948a cipher list to convert to a cipher preference list. If it is not included
55*2175Sjp161948then the default cipher list will be used. The format is described below.
56*2175Sjp161948
57*2175Sjp161948=back
58*2175Sjp161948
59*2175Sjp161948=head1 CIPHER LIST FORMAT
60*2175Sjp161948
61*2175Sjp161948The cipher list consists of one or more I<cipher strings> separated by colons.
62*2175Sjp161948Commas or spaces are also acceptable separators but colons are normally used.
63*2175Sjp161948
64*2175Sjp161948The actual cipher string can take several different forms.
65*2175Sjp161948
66*2175Sjp161948It can consist of a single cipher suite such as B<RC4-SHA>.
67*2175Sjp161948
68*2175Sjp161948It can represent a list of cipher suites containing a certain algorithm, or
69*2175Sjp161948cipher suites of a certain type. For example B<SHA1> represents all ciphers
70*2175Sjp161948suites using the digest algorithm SHA1 and B<SSLv3> represents all SSL v3
71*2175Sjp161948algorithms.
72*2175Sjp161948
73*2175Sjp161948Lists of cipher suites can be combined in a single cipher string using the
74*2175Sjp161948B<+> character. This is used as a logical B<and> operation. For example
75*2175Sjp161948B<SHA1+DES> represents all cipher suites containing the SHA1 B<and> the DES
76*2175Sjp161948algorithms.
77*2175Sjp161948
78*2175Sjp161948Each cipher string can be optionally preceded by the characters B<!>,
79*2175Sjp161948B<-> or B<+>.
80*2175Sjp161948
81*2175Sjp161948If B<!> is used then the ciphers are permanently deleted from the list.
82*2175Sjp161948The ciphers deleted can never reappear in the list even if they are
83*2175Sjp161948explicitly stated.
84*2175Sjp161948
85*2175Sjp161948If B<-> is used then the ciphers are deleted from the list, but some or
86*2175Sjp161948all of the ciphers can be added again by later options.
87*2175Sjp161948
88*2175Sjp161948If B<+> is used then the ciphers are moved to the end of the list. This
89*2175Sjp161948option doesn't add any new ciphers it just moves matching existing ones.
90*2175Sjp161948
91*2175Sjp161948If none of these characters is present then the string is just interpreted
92*2175Sjp161948as a list of ciphers to be appended to the current preference list. If the
93*2175Sjp161948list includes any ciphers already present they will be ignored: that is they
94*2175Sjp161948will not moved to the end of the list.
95*2175Sjp161948
96*2175Sjp161948Additionally the cipher string B<@STRENGTH> can be used at any point to sort
97*2175Sjp161948the current cipher list in order of encryption algorithm key length.
98*2175Sjp161948
99*2175Sjp161948=head1 CIPHER STRINGS
100*2175Sjp161948
101*2175Sjp161948The following is a list of all permitted cipher strings and their meanings.
102*2175Sjp161948
103*2175Sjp161948=over 4
104*2175Sjp161948
105*2175Sjp161948=item B<DEFAULT>
106*2175Sjp161948
107*2175Sjp161948the default cipher list. This is determined at compile time and is normally
108*2175Sjp161948B<ALL:!ADH:RC4+RSA:+SSLv2:@STRENGTH>. This must be the first cipher string
109*2175Sjp161948specified.
110*2175Sjp161948
111*2175Sjp161948=item B<COMPLEMENTOFDEFAULT>
112*2175Sjp161948
113*2175Sjp161948the ciphers included in B<ALL>, but not enabled by default. Currently
114*2175Sjp161948this is B<ADH>. Note that this rule does not cover B<eNULL>, which is
115*2175Sjp161948not included by B<ALL> (use B<COMPLEMENTOFALL> if necessary).
116*2175Sjp161948
117*2175Sjp161948=item B<ALL>
118*2175Sjp161948
119*2175Sjp161948all ciphers suites except the B<eNULL> ciphers which must be explicitly enabled.
120*2175Sjp161948
121*2175Sjp161948=item B<COMPLEMENTOFALL>
122*2175Sjp161948
123*2175Sjp161948the cipher suites not enabled by B<ALL>, currently being B<eNULL>.
124*2175Sjp161948
125*2175Sjp161948=item B<HIGH>
126*2175Sjp161948
127*2175Sjp161948"high" encryption cipher suites. This currently means those with key lengths larger
128*2175Sjp161948than 128 bits.
129*2175Sjp161948
130*2175Sjp161948=item B<MEDIUM>
131*2175Sjp161948
132*2175Sjp161948"medium" encryption cipher suites, currently those using 128 bit encryption.
133*2175Sjp161948
134*2175Sjp161948=item B<LOW>
135*2175Sjp161948
136*2175Sjp161948"low" encryption cipher suites, currently those using 64 or 56 bit encryption algorithms
137*2175Sjp161948but excluding export cipher suites.
138*2175Sjp161948
139*2175Sjp161948=item B<EXP>, B<EXPORT>
140*2175Sjp161948
141*2175Sjp161948export encryption algorithms. Including 40 and 56 bits algorithms.
142*2175Sjp161948
143*2175Sjp161948=item B<EXPORT40>
144*2175Sjp161948
145*2175Sjp16194840 bit export encryption algorithms
146*2175Sjp161948
147*2175Sjp161948=item B<EXPORT56>
148*2175Sjp161948
149*2175Sjp16194856 bit export encryption algorithms.
150*2175Sjp161948
151*2175Sjp161948=item B<eNULL>, B<NULL>
152*2175Sjp161948
153*2175Sjp161948the "NULL" ciphers that is those offering no encryption. Because these offer no
154*2175Sjp161948encryption at all and are a security risk they are disabled unless explicitly
155*2175Sjp161948included.
156*2175Sjp161948
157*2175Sjp161948=item B<aNULL>
158*2175Sjp161948
159*2175Sjp161948the cipher suites offering no authentication. This is currently the anonymous
160*2175Sjp161948DH algorithms. These cipher suites are vulnerable to a "man in the middle"
161*2175Sjp161948attack and so their use is normally discouraged.
162*2175Sjp161948
163*2175Sjp161948=item B<kRSA>, B<RSA>
164*2175Sjp161948
165*2175Sjp161948cipher suites using RSA key exchange.
166*2175Sjp161948
167*2175Sjp161948=item B<kEDH>
168*2175Sjp161948
169*2175Sjp161948cipher suites using ephemeral DH key agreement.
170*2175Sjp161948
171*2175Sjp161948=item B<kDHr>, B<kDHd>
172*2175Sjp161948
173*2175Sjp161948cipher suites using DH key agreement and DH certificates signed by CAs with RSA
174*2175Sjp161948and DSS keys respectively. Not implemented.
175*2175Sjp161948
176*2175Sjp161948=item B<aRSA>
177*2175Sjp161948
178*2175Sjp161948cipher suites using RSA authentication, i.e. the certificates carry RSA keys.
179*2175Sjp161948
180*2175Sjp161948=item B<aDSS>, B<DSS>
181*2175Sjp161948
182*2175Sjp161948cipher suites using DSS authentication, i.e. the certificates carry DSS keys.
183*2175Sjp161948
184*2175Sjp161948=item B<aDH>
185*2175Sjp161948
186*2175Sjp161948cipher suites effectively using DH authentication, i.e. the certificates carry
187*2175Sjp161948DH keys.  Not implemented.
188*2175Sjp161948
189*2175Sjp161948=item B<kFZA>, B<aFZA>, B<eFZA>, B<FZA>
190*2175Sjp161948
191*2175Sjp161948ciphers suites using FORTEZZA key exchange, authentication, encryption or all
192*2175Sjp161948FORTEZZA algorithms. Not implemented.
193*2175Sjp161948
194*2175Sjp161948=item B<TLSv1>, B<SSLv3>, B<SSLv2>
195*2175Sjp161948
196*2175Sjp161948TLS v1.0, SSL v3.0 or SSL v2.0 cipher suites respectively.
197*2175Sjp161948
198*2175Sjp161948=item B<DH>
199*2175Sjp161948
200*2175Sjp161948cipher suites using DH, including anonymous DH.
201*2175Sjp161948
202*2175Sjp161948=item B<ADH>
203*2175Sjp161948
204*2175Sjp161948anonymous DH cipher suites.
205*2175Sjp161948
206*2175Sjp161948=item B<AES>
207*2175Sjp161948
208*2175Sjp161948cipher suites using AES.
209*2175Sjp161948
210*2175Sjp161948=item B<3DES>
211*2175Sjp161948
212*2175Sjp161948cipher suites using triple DES.
213*2175Sjp161948
214*2175Sjp161948=item B<DES>
215*2175Sjp161948
216*2175Sjp161948cipher suites using DES (not triple DES).
217*2175Sjp161948
218*2175Sjp161948=item B<RC4>
219*2175Sjp161948
220*2175Sjp161948cipher suites using RC4.
221*2175Sjp161948
222*2175Sjp161948=item B<RC2>
223*2175Sjp161948
224*2175Sjp161948cipher suites using RC2.
225*2175Sjp161948
226*2175Sjp161948=item B<IDEA>
227*2175Sjp161948
228*2175Sjp161948cipher suites using IDEA.
229*2175Sjp161948
230*2175Sjp161948=item B<MD5>
231*2175Sjp161948
232*2175Sjp161948cipher suites using MD5.
233*2175Sjp161948
234*2175Sjp161948=item B<SHA1>, B<SHA>
235*2175Sjp161948
236*2175Sjp161948cipher suites using SHA1.
237*2175Sjp161948
238*2175Sjp161948=back
239*2175Sjp161948
240*2175Sjp161948=head1 CIPHER SUITE NAMES
241*2175Sjp161948
242*2175Sjp161948The following lists give the SSL or TLS cipher suites names from the
243*2175Sjp161948relevant specification and their OpenSSL equivalents. It should be noted,
244*2175Sjp161948that several cipher suite names do not include the authentication used,
245*2175Sjp161948e.g. DES-CBC3-SHA. In these cases, RSA authentication is used.
246*2175Sjp161948
247*2175Sjp161948=head2 SSL v3.0 cipher suites.
248*2175Sjp161948
249*2175Sjp161948 SSL_RSA_WITH_NULL_MD5                   NULL-MD5
250*2175Sjp161948 SSL_RSA_WITH_NULL_SHA                   NULL-SHA
251*2175Sjp161948 SSL_RSA_EXPORT_WITH_RC4_40_MD5          EXP-RC4-MD5
252*2175Sjp161948 SSL_RSA_WITH_RC4_128_MD5                RC4-MD5
253*2175Sjp161948 SSL_RSA_WITH_RC4_128_SHA                RC4-SHA
254*2175Sjp161948 SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5      EXP-RC2-CBC-MD5
255*2175Sjp161948 SSL_RSA_WITH_IDEA_CBC_SHA               IDEA-CBC-SHA
256*2175Sjp161948 SSL_RSA_EXPORT_WITH_DES40_CBC_SHA       EXP-DES-CBC-SHA
257*2175Sjp161948 SSL_RSA_WITH_DES_CBC_SHA                DES-CBC-SHA
258*2175Sjp161948 SSL_RSA_WITH_3DES_EDE_CBC_SHA           DES-CBC3-SHA
259*2175Sjp161948
260*2175Sjp161948 SSL_DH_DSS_EXPORT_WITH_DES40_CBC_SHA    Not implemented.
261*2175Sjp161948 SSL_DH_DSS_WITH_DES_CBC_SHA             Not implemented.
262*2175Sjp161948 SSL_DH_DSS_WITH_3DES_EDE_CBC_SHA        Not implemented.
263*2175Sjp161948 SSL_DH_RSA_EXPORT_WITH_DES40_CBC_SHA    Not implemented.
264*2175Sjp161948 SSL_DH_RSA_WITH_DES_CBC_SHA             Not implemented.
265*2175Sjp161948 SSL_DH_RSA_WITH_3DES_EDE_CBC_SHA        Not implemented.
266*2175Sjp161948 SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA   EXP-EDH-DSS-DES-CBC-SHA
267*2175Sjp161948 SSL_DHE_DSS_WITH_DES_CBC_SHA            EDH-DSS-CBC-SHA
268*2175Sjp161948 SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA       EDH-DSS-DES-CBC3-SHA
269*2175Sjp161948 SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA   EXP-EDH-RSA-DES-CBC-SHA
270*2175Sjp161948 SSL_DHE_RSA_WITH_DES_CBC_SHA            EDH-RSA-DES-CBC-SHA
271*2175Sjp161948 SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA       EDH-RSA-DES-CBC3-SHA
272*2175Sjp161948
273*2175Sjp161948 SSL_DH_anon_EXPORT_WITH_RC4_40_MD5      EXP-ADH-RC4-MD5
274*2175Sjp161948 SSL_DH_anon_WITH_RC4_128_MD5            ADH-RC4-MD5
275*2175Sjp161948 SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA   EXP-ADH-DES-CBC-SHA
276*2175Sjp161948 SSL_DH_anon_WITH_DES_CBC_SHA            ADH-DES-CBC-SHA
277*2175Sjp161948 SSL_DH_anon_WITH_3DES_EDE_CBC_SHA       ADH-DES-CBC3-SHA
278*2175Sjp161948
279*2175Sjp161948 SSL_FORTEZZA_KEA_WITH_NULL_SHA          Not implemented.
280*2175Sjp161948 SSL_FORTEZZA_KEA_WITH_FORTEZZA_CBC_SHA  Not implemented.
281*2175Sjp161948 SSL_FORTEZZA_KEA_WITH_RC4_128_SHA       Not implemented.
282*2175Sjp161948
283*2175Sjp161948=head2 TLS v1.0 cipher suites.
284*2175Sjp161948
285*2175Sjp161948 TLS_RSA_WITH_NULL_MD5                   NULL-MD5
286*2175Sjp161948 TLS_RSA_WITH_NULL_SHA                   NULL-SHA
287*2175Sjp161948 TLS_RSA_EXPORT_WITH_RC4_40_MD5          EXP-RC4-MD5
288*2175Sjp161948 TLS_RSA_WITH_RC4_128_MD5                RC4-MD5
289*2175Sjp161948 TLS_RSA_WITH_RC4_128_SHA                RC4-SHA
290*2175Sjp161948 TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5      EXP-RC2-CBC-MD5
291*2175Sjp161948 TLS_RSA_WITH_IDEA_CBC_SHA               IDEA-CBC-SHA
292*2175Sjp161948 TLS_RSA_EXPORT_WITH_DES40_CBC_SHA       EXP-DES-CBC-SHA
293*2175Sjp161948 TLS_RSA_WITH_DES_CBC_SHA                DES-CBC-SHA
294*2175Sjp161948 TLS_RSA_WITH_3DES_EDE_CBC_SHA           DES-CBC3-SHA
295*2175Sjp161948
296*2175Sjp161948 TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA    Not implemented.
297*2175Sjp161948 TLS_DH_DSS_WITH_DES_CBC_SHA             Not implemented.
298*2175Sjp161948 TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA        Not implemented.
299*2175Sjp161948 TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA    Not implemented.
300*2175Sjp161948 TLS_DH_RSA_WITH_DES_CBC_SHA             Not implemented.
301*2175Sjp161948 TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA        Not implemented.
302*2175Sjp161948 TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA   EXP-EDH-DSS-DES-CBC-SHA
303*2175Sjp161948 TLS_DHE_DSS_WITH_DES_CBC_SHA            EDH-DSS-CBC-SHA
304*2175Sjp161948 TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA       EDH-DSS-DES-CBC3-SHA
305*2175Sjp161948 TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA   EXP-EDH-RSA-DES-CBC-SHA
306*2175Sjp161948 TLS_DHE_RSA_WITH_DES_CBC_SHA            EDH-RSA-DES-CBC-SHA
307*2175Sjp161948 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA       EDH-RSA-DES-CBC3-SHA
308*2175Sjp161948
309*2175Sjp161948 TLS_DH_anon_EXPORT_WITH_RC4_40_MD5      EXP-ADH-RC4-MD5
310*2175Sjp161948 TLS_DH_anon_WITH_RC4_128_MD5            ADH-RC4-MD5
311*2175Sjp161948 TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA   EXP-ADH-DES-CBC-SHA
312*2175Sjp161948 TLS_DH_anon_WITH_DES_CBC_SHA            ADH-DES-CBC-SHA
313*2175Sjp161948 TLS_DH_anon_WITH_3DES_EDE_CBC_SHA       ADH-DES-CBC3-SHA
314*2175Sjp161948
315*2175Sjp161948=head2 AES ciphersuites from RFC3268, extending TLS v1.0
316*2175Sjp161948
317*2175Sjp161948 TLS_RSA_WITH_AES_128_CBC_SHA            AES128-SHA
318*2175Sjp161948 TLS_RSA_WITH_AES_256_CBC_SHA            AES256-SHA
319*2175Sjp161948
320*2175Sjp161948 TLS_DH_DSS_WITH_AES_128_CBC_SHA         DH-DSS-AES128-SHA
321*2175Sjp161948 TLS_DH_DSS_WITH_AES_256_CBC_SHA         DH-DSS-AES256-SHA
322*2175Sjp161948 TLS_DH_RSA_WITH_AES_128_CBC_SHA         DH-RSA-AES128-SHA
323*2175Sjp161948 TLS_DH_RSA_WITH_AES_256_CBC_SHA         DH-RSA-AES256-SHA
324*2175Sjp161948
325*2175Sjp161948 TLS_DHE_DSS_WITH_AES_128_CBC_SHA        DHE-DSS-AES128-SHA
326*2175Sjp161948 TLS_DHE_DSS_WITH_AES_256_CBC_SHA        DHE-DSS-AES256-SHA
327*2175Sjp161948 TLS_DHE_RSA_WITH_AES_128_CBC_SHA        DHE-RSA-AES128-SHA
328*2175Sjp161948 TLS_DHE_RSA_WITH_AES_256_CBC_SHA        DHE-RSA-AES256-SHA
329*2175Sjp161948
330*2175Sjp161948 TLS_DH_anon_WITH_AES_128_CBC_SHA        ADH-AES128-SHA
331*2175Sjp161948 TLS_DH_anon_WITH_AES_256_CBC_SHA        ADH-AES256-SHA
332*2175Sjp161948
333*2175Sjp161948=head2 Additional Export 1024 and other cipher suites
334*2175Sjp161948
335*2175Sjp161948Note: these ciphers can also be used in SSL v3.
336*2175Sjp161948
337*2175Sjp161948 TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA     EXP1024-DES-CBC-SHA
338*2175Sjp161948 TLS_RSA_EXPORT1024_WITH_RC4_56_SHA      EXP1024-RC4-SHA
339*2175Sjp161948 TLS_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA EXP1024-DHE-DSS-DES-CBC-SHA
340*2175Sjp161948 TLS_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA  EXP1024-DHE-DSS-RC4-SHA
341*2175Sjp161948 TLS_DHE_DSS_WITH_RC4_128_SHA            DHE-DSS-RC4-SHA
342*2175Sjp161948
343*2175Sjp161948=head2 SSL v2.0 cipher suites.
344*2175Sjp161948
345*2175Sjp161948 SSL_CK_RC4_128_WITH_MD5                 RC4-MD5
346*2175Sjp161948 SSL_CK_RC4_128_EXPORT40_WITH_MD5        EXP-RC4-MD5
347*2175Sjp161948 SSL_CK_RC2_128_CBC_WITH_MD5             RC2-MD5
348*2175Sjp161948 SSL_CK_RC2_128_CBC_EXPORT40_WITH_MD5    EXP-RC2-MD5
349*2175Sjp161948 SSL_CK_IDEA_128_CBC_WITH_MD5            IDEA-CBC-MD5
350*2175Sjp161948 SSL_CK_DES_64_CBC_WITH_MD5              DES-CBC-MD5
351*2175Sjp161948 SSL_CK_DES_192_EDE3_CBC_WITH_MD5        DES-CBC3-MD5
352*2175Sjp161948
353*2175Sjp161948=head1 NOTES
354*2175Sjp161948
355*2175Sjp161948The non-ephemeral DH modes are currently unimplemented in OpenSSL
356*2175Sjp161948because there is no support for DH certificates.
357*2175Sjp161948
358*2175Sjp161948Some compiled versions of OpenSSL may not include all the ciphers
359*2175Sjp161948listed here because some ciphers were excluded at compile time.
360*2175Sjp161948
361*2175Sjp161948=head1 EXAMPLES
362*2175Sjp161948
363*2175Sjp161948Verbose listing of all OpenSSL ciphers including NULL ciphers:
364*2175Sjp161948
365*2175Sjp161948 openssl ciphers -v 'ALL:eNULL'
366*2175Sjp161948
367*2175Sjp161948Include all ciphers except NULL and anonymous DH then sort by
368*2175Sjp161948strength:
369*2175Sjp161948
370*2175Sjp161948 openssl ciphers -v 'ALL:!ADH:@STRENGTH'
371*2175Sjp161948
372*2175Sjp161948Include only 3DES ciphers and then place RSA ciphers last:
373*2175Sjp161948
374*2175Sjp161948 openssl ciphers -v '3DES:+RSA'
375*2175Sjp161948
376*2175Sjp161948Include all RC4 ciphers but leave out those without authentication:
377*2175Sjp161948
378*2175Sjp161948 openssl ciphers -v 'RC4:!COMPLEMENTOFDEFAULT'
379*2175Sjp161948
380*2175Sjp161948Include all chiphers with RSA authentication but leave out ciphers without
381*2175Sjp161948encryption.
382*2175Sjp161948
383*2175Sjp161948 openssl ciphers -v 'RSA:!COMPLEMENTOFALL'
384*2175Sjp161948
385*2175Sjp161948=head1 SEE ALSO
386*2175Sjp161948
387*2175Sjp161948L<s_client(1)|s_client(1)>, L<s_server(1)|s_server(1)>, L<ssl(3)|ssl(3)>
388*2175Sjp161948
389*2175Sjp161948=head1 HISTORY
390*2175Sjp161948
391*2175Sjp161948The B<COMPLENTOFALL> and B<COMPLEMENTOFDEFAULT> selection options were
392*2175Sjp161948added in version 0.9.7.
393*2175Sjp161948
394*2175Sjp161948=cut
395