97 lines
4.0 KiB
Markdown
97 lines
4.0 KiB
Markdown
|
|
|
|
Instructions
|
|
============
|
|
|
|
The precompiled binaries provided here have extended support for everything
|
|
which is normally not configured to be compiled (56 Bit, export/ANOn ciphers, SSLv2 etc.)
|
|
The bninraies come also with extended support for new cipher suites and/or
|
|
features which are not yet in the official branch.
|
|
|
|
The binaries in this directory are all compiled from an OpenSSL 1.0.2 fork
|
|
from Peter Mosmans. He has patched the master git branch
|
|
to support CHACHA20 + POLY1305 and other ciphers (like CAMELIA 256 Bit).
|
|
|
|
CHACHA20 + POLY1305 cipher suites from the official git repo didn't
|
|
work for me work correctly, it's also likely they'll disappear shortly
|
|
(https://www.mail-archive.com/openssl-dev@openssl.org/msg34756.html).
|
|
|
|
**Pls note bug [#38](https://github.com/drwetter/testssl.sh/issues/38) = bug [#5 @PeterMosmans openssl](https://github.com/PeterMosmans/openssl/issues/5): False negatives for 40Bit and export ciphers.** Workaround: use the binaries from the vanilla tree, see https://github.com/drwetter/testssl.sh/openssl-bins/openssl-1.0.2-vanilla.
|
|
|
|
|
|
General
|
|
-------
|
|
|
|
Both 64+32 bit versions were compiled under Ubuntu 12.04 LTS. Likely you cannot use older distributions, younger should work. I provide for each distributions two sets of binaries:
|
|
|
|
* statically linked binaries
|
|
* dynamically linked binaries with MIT Kerberos support ("krb5" in the name)
|
|
|
|
For the latter you need a whopping bunch of kerberos libraries which you maybe need to
|
|
install from your distributor (libgssapi_krb5, libkrb5, libcom_err, libk5crypto, libkrb5support,
|
|
libkeyutils). For the 'static' binaries kerberos is not compiled in, so that's is not needed.
|
|
|
|
|
|
Compilation instructions
|
|
------------------------
|
|
|
|
If you want to compile OpenSSL yourself, here are the instructions:
|
|
|
|
1.) get openssl from Peter Mosmans' repo:
|
|
|
|
git clone https://github.com/PeterMosmans/openssl
|
|
cd openssl
|
|
|
|
2.) configure the damned thing. Options I used:
|
|
|
|
**for 64Bit including Kerberos ciphers:**
|
|
|
|
./config --prefix=/usr/ --openssldir=/etc/ssl enable-zlib enable-ssl2 enable-rc5 enable-rc2 \
|
|
enable-GOST enable-cms enable-md2 enable-mdc2 enable-ec enable-ec2m enable-ecdh enable-ecdsa \
|
|
enable-seed enable-camellia enable-idea enable-rfc3779 enable-ec_nistp_64_gcc_128 \
|
|
--with-krb5-flavor=MIT experimental-jpake
|
|
|
|
**for 64Bit, static binaries:**
|
|
|
|
./config --prefix=/usr/ --openssldir=/etc/ssl enable-zlib enable-ssl2 enable-rc5 enable-rc2 \
|
|
enable-GOST enable-cms enable-md2 enable-mdc2 enable-ec enable-ec2m enable-ecdh enable-ecdsa \
|
|
enable-seed enable-camellia enable-idea enable-rfc3779 enable-ec_nistp_64_gcc_128 \
|
|
-static experimental-jpake
|
|
|
|
**for 32 Bit including Kerberos ciphers:**
|
|
|
|
./config --prefix=/usr/ --openssldir=/etc/ssl enable-zlib enable-ssl2 enable-rc5 enable-rc2 \
|
|
enable-GOST enable-cms enable-md2 enable-mdc2 enable-ec enable-ec2m enable-ecdh enable-ecdsa \
|
|
enable-seed enable-camellia enable-idea enable-rfc3779 no-ec_nistp_64_gcc_128 \
|
|
--with-krb5-flavor=MIT experimental-jpake
|
|
|
|
**for 32 Bit, static binaries:**
|
|
|
|
./config --prefix=/usr/ --openssldir=/etc/ssl enable-zlib enable-ssl2 enable-rc5 enable-rc2 \
|
|
enable-GOST enable-cms enable-md2 enable-mdc2 enable-ec enable-ec2m enable-ecdh enable-ecdsa \
|
|
enable-seed enable-camellia enable-idea enable-rfc3779 no-ec_nistp_64_gcc_128 \
|
|
-static experimental-jpake
|
|
|
|
Don't use -DTEMP_GOST_TLS, it currently breaks things and it is not needed for general GOST [1] support.
|
|
|
|
If you don't have / don't want Kerberos libraries and devel rpms/debs, omit "--with-krb5-flavor=MIT" (see examples). If you have other Kerberos flavors you need to figure out by yourself.
|
|
|
|
3.) make depend
|
|
|
|
4.) make
|
|
|
|
5.) make report (check whether it runs ok)
|
|
|
|
6.) "./apps/openssl ciphers -V 'ALL:COMPLEMENTOFALL' | wc -l" lists now for me
|
|
* 191(+4 GOST) ciphers -- including kerberos
|
|
* 177(+4 GOST) ciphers without kerberos
|
|
|
|
as opposed to 111/109 from Ubuntu or Opensuse.
|
|
|
|
Enjoy, Dirk
|
|
|
|
PS: **Never use these binaries for anything else then for testing**
|
|
|
|
|
|
[1] https://en.wikipedia.org/wiki/GOST_%29block_cipher%29
|