![]() |
![]()
| ![]() |
![]()
NAME
SYNOPSIS
void
void
int
int
DESCRIPTIONA security level is a set of restrictions on algorithms, key lengths, protocol versions, and other features in TLS connections. These restrictions apply in addition to those that exist from individually selecting supported features, for example ciphers, curves, or algorithms. The following table shows properties of the various security levels:
The meaning of the columns is as follows:
Level 0 is only provided for backward compatibility and permits everything. Level 3 and higher disable support for session tickets and only accept cipher suites that provide forward secrecy. The functions
SSL_CTX_new(3) initializes the security level of the new object to 1. SSL_new(3) and SSL_set_SSL_CTX(3) copy the security level from the context to the SSL object. SSL_dup(3) copies the security level from the old to the new object. RETURN VALUES
SEE ALSOEVP_PKEY_security_bits(3), RSA_security_bits(3), ssl(3), SSL_CTX_new(3), SSL_new(3) Elaine Barker, Recommendation for Key Management, U.S. National Institute of Standards and Technology, NIST Special Publication 800-57 Part 1 Revision 5, https://doi.org/10.6028/NIST.SP.800-57pt1r5, Gaithersburg, MD, May 2020. HISTORYThese functions first appeared in OpenSSL 1.1.0 and have been available since OpenBSD 7.2. CAVEATSApplications which do not check the return values of configuration functions will misbehave. For example, if an application does not check the return value after trying to set a certificate and the certificate is rejected because of the security level, the application may behave as if no certificate had been provided at all. While some restrictions may be handled gracefully by negotiations between the client and the server, other restrictions may be fatal and abort the TLS handshake. For example, this can happen if the peer certificate contains a key that is too short or if the DH parameter size is too small.
|