LFS-RPM/SOURCES
2023-05-13 04:13:32 -07:00
..
AGPL-3.0.txt perl Software::License 2023-04-22 12:46:35 -07:00
Apache-1.1.txt perl Software::License 2023-04-22 12:46:35 -07:00
Apache-2.0.txt perl Software::License 2023-04-22 12:46:35 -07:00
Artistic-1.0-Perl.txt perl Software::License 2023-04-22 12:46:35 -07:00
Artistic-2.0.txt perl Software::License 2023-04-22 12:46:35 -07:00
bash-bashrc add bash completion 2023-05-05 14:39:44 -07:00
bash-profile initial checkin 2023-04-11 18:47:13 -07:00
BSD-2-Clause.txt fixed quotation marks 2023-05-06 19:31:34 -07:00
BSD-3-Clause.txt fix quotation marks 2023-04-26 10:47:48 -07:00
CC0-1.0.txt perl Software::License 2023-04-22 12:46:35 -07:00
CC0-Public_Domain.md initial checkin 2023-04-04 14:38:03 -07:00
config-6.1.28-genesis.1 update to kernel 6.1.28 2023-05-11 14:09:30 -07:00
etc-vimrc initial checkin 2023-04-16 22:32:33 -07:00
EUPL-1.1.txt perl Software::License 2023-04-22 12:46:35 -07:00
EUPL-1.2.txt perl Software::License 2023-04-22 12:46:35 -07:00
GFDL-1.2.txt perl Software::License 2023-04-22 12:46:35 -07:00
GFDL-1.3.txt perl Software::License 2023-04-22 12:46:35 -07:00
GPL-1.0.txt perl Software::License 2023-04-22 12:46:35 -07:00
GPL-2.0.txt perl Software::License 2023-04-22 12:46:35 -07:00
GPL-3.0.txt perl Software::License 2023-04-22 12:46:35 -07:00
group14.pem libressl 2023-05-07 23:35:11 -07:00
group15.pem libressl 2023-05-07 23:35:11 -07:00
group16.pem libressl 2023-05-07 23:35:11 -07:00
group17.pem libressl 2023-05-07 23:35:11 -07:00
group18.pem libressl 2023-05-07 23:35:11 -07:00
ISC.txt perl Software::License 2023-04-22 12:46:35 -07:00
LGPL-2.1.txt perl Software::License 2023-04-22 12:46:35 -07:00
LGPL-3.0.txt perl Software::License 2023-04-22 12:46:35 -07:00
libevent-2.1.12-libressl.patch links and dep chain to build it 2023-04-27 07:29:58 -07:00
libressl-3.7.2-cnf-name.patch libressl 2023-05-07 23:35:11 -07:00
libressl-3.7.2-manpage.patch libressl 2023-05-07 23:35:11 -07:00
libressl-yjl-additions.cnf libressl 2023-05-07 23:35:11 -07:00
libssh2-1.10.0-libressl.patch Fixes LibreSSL build 2023-05-13 04:13:32 -07:00
MIT.txt perl Software::License 2023-04-22 12:46:35 -07:00
Mozilla-CA-20221114-cacert.patch Mozilla::CA module 2023-05-06 13:35:24 -07:00
MPL-1.0.txt perl Software::License 2023-04-22 12:46:35 -07:00
MPL-1.1.txt perl Software::License 2023-04-22 12:46:35 -07:00
MPL-2.0.txt perl Software::License 2023-04-22 12:46:35 -07:00
nss-3.88.1-standalone-rpm.patch nspr/nss 2023-05-02 13:16:19 -07:00
ntp-conf ntp spec file 2023-05-06 19:32:06 -07:00
openssl-3.1.0-man1.filelist openssl 2023-05-08 02:46:37 -07:00
openssl-3.1.0-man3.filelist openssl 2023-05-08 02:46:37 -07:00
openssl-3.1.0-man7.filelist openssl 2023-05-08 02:46:37 -07:00
OpenSSL.txt perl Software::License 2023-04-22 12:46:35 -07:00
p11-kit-0.24.1-trust.patch initial checkin 2023-05-01 06:18:49 -07:00
Perl5-License.txt perl Software::License 2023-04-22 12:46:35 -07:00
perl-manlist-5.36.0.txt More specfile work 2023-04-23 11:00:47 -07:00
perl-manlist-5.36.1.txt work on sub-packages 2023-04-23 21:43:17 -07:00
PostgreSQL.txt perl Software::License 2023-04-22 12:46:35 -07:00
profile.d-texlive.sh initial checkin 2023-04-04 14:38:03 -07:00
QPL-1.0.txt perl Software::License 2023-04-22 12:46:35 -07:00
README.DHE.md libressl 2023-05-07 23:35:11 -07:00
rpm-macros-makeca add rpm macro file 2023-05-06 13:36:41 -07:00
rpm-macros-perl-5.36 change core macro names 2023-04-25 20:53:15 -07:00
rpm-macros-python-3.11 Python3 2023-05-10 02:37:48 -07:00
SSLeay.txt perl Software::License 2023-04-22 12:46:35 -07:00
update-tl.sh initial checkin 2023-04-04 14:38:03 -07:00
WWW-Curl-4.17-curl-8.0.1.patch more perl stuff 2023-05-09 20:01:59 -07:00
yjl-install-tl.sh initial checkin 2023-04-04 14:38:03 -07:00
yjl-lfs-macros-11.3 links and dep chain to build it 2023-04-27 07:29:58 -07:00
Zlib.txt perl Software::License 2023-04-22 12:46:35 -07:00

DH Paramaters

It is the opinion of the LibreSSL packager that whenever possible, DHE key exchange should be avoided and ECDHE key exchange should be used instead.

Some TLS clients do not support ECDHE key exchange, so DHE may still need to be supported on some servers.

MODP IKE DH Paramaters

RFC 3526 defines several Diffie-Hellman groups for the Internet Key Exchange (IKE) protocol.

The RFC may be retrieved at https://www.ietf.org/rfc/rfc3526.txt

From that RFC, the following DH groups are provided in PEM format:

  • /etc/pki/tls/MODP-IKE-2048-group14.pem
  • /etc/pki/tls/MODP-IKE-3072-group15.pem
  • /etc/pki/tls/MODP-IKE-4096-group16.pem
  • /etc/pki/tls/MODP-IKE-6144-group17.pem
  • /etc/pki/tls/MODP-IKE-8192-group18.pem

The .pem files were retrieved from https://bettercrypto.org/static/dhparams/

At this point in time it is no longer recommended to use DH groups less than 2048-bit and if you must, they should be uniquely generated and fairly frequently so. For this reason, the 1536-bit MODP parameters are not included here.

LibreSSL DH Parameters

DH parameters < 1024-bit should never be used and are not supported by the LibreSSL library. They are vulnerable to the logjam attack, see https://weakdh.org/ for more information.

DH parameters < 2048-bit should not be used but a few TLS clients still in use do not support DH parameters > 1024-bit. When using a 1024-bit group to satisfy those clients it is important that they are unique to your server and are re-generated frequently.

YJL provides a cron script in /etc/cron.daily that will generate a fresh 2048-bit group on a daily basis, and a cron script in /etc/cron.monthly that will generate fresh 3072-bit and 4096-bit groups on a monthly basis.

The results of those scripts are placed in the following PEM format files:

  • /etc/pki/tls/dh2048.pem
  • /etc/pki/tls/dh3072.pem
  • /etc/pki/tls/dh4096.pem

The initial group in the dh2048.pem, dh3072.pem, and dh4096.pem files are the same as the MODP-IKE parameters. The group in the dh2048.pem file will be replaced by a fresh unique group generated on your server within a day of install, and the groups in the dh3072.pem and dh4096.pem files will be replaced by fresh unique groups within a month of install.

Which to Use?

If you must use a 1024-bit group, you will need to generate it youself. I would recommend regenerating it at least four times a day.

For 2048-bit, 3072-bit, 4096-bit you have a choice. Some prefer the pre-defined MODP-IKE parameters as they have likely been reviewed by many eyes, while others prefer parameters uniquely generated on the server.

It is hypothetically possible unique parameters have a flaw that can be exploited (e.g. not truly prime and can be factored) but it is very unlikely.

Similarly it is possible an attack has been crafted for the RFC published DH parameters, though that also is unlikely as it would almost certainly take more computing power than even the NSA has to even develop an attack against the published 2048-bit group.

My personal preference is to use the dh2048.pem parameters that are daily re-generated on the server when I need to support DHE key exchange. The rationale I use is that if an attack ever is developed, it provides a moving target rather than a static target.

If security beyond what the dh4096.pem parameters can provide is required, then I require ECDHE key exchange.

EOF