Reduce the security bits for MD5 and SHA1 based signatures in TLS
authorKurt Roeckx <kurt@roeckx.be>
Thu, 2 Jan 2020 22:25:27 +0000 (23:25 +0100)
committerKurt Roeckx <kurt@roeckx.be>
Sat, 27 Jun 2020 06:41:40 +0000 (08:41 +0200)
commitaba03ae571ea677fc484daef00a21ca8f7e82708
treebf3f446083418e99c72828d32986d616c2e4c66b
parent526f1f1acab4fe96f618ab785a5f2ecabf0035d5
Reduce the security bits for MD5 and SHA1 based signatures in TLS

This has as effect that SHA1 and MD5+SHA1 are no longer supported at
security level 1, and that TLS < 1.2 is no longer supported at the
default security level of 1, and that you need to set the security
level to 0 to use TLS < 1.2.

Reviewed-by: Tim Hudson <tjh@openssl.org>
GH: #10787
21 files changed:
CHANGES.md
NEWS.md
ssl/t1_lib.c
test/recipes/70-test_renegotiation.t
test/recipes/70-test_sslextension.t
test/recipes/70-test_sslrecords.t
test/recipes/70-test_sslsigalgs.t
test/recipes/70-test_sslversions.t
test/recipes/70-test_tls13downgrade.t
test/ssl-tests/02-protocol-version.cnf
test/ssl-tests/04-client_auth.cnf
test/ssl-tests/04-client_auth.cnf.in
test/ssl-tests/05-sni.cnf
test/ssl-tests/05-sni.cnf.in
test/ssl-tests/07-dtls-protocol-version.cnf
test/ssl-tests/10-resumption.cnf
test/ssl-tests/11-dtls_resumption.cnf
test/ssl-tests/20-cert-select.cnf
test/ssl-tests/20-cert-select.cnf.in
test/ssl-tests/protocol_version.pm
test/sslapitest.c