Skip to content

Commit 1af2aa6

Browse files
committed
Review text, renew some paragraphs
.. and update links, reflect name change to -bad
1 parent 5eb07e1 commit 1af2aa6

File tree

1 file changed

+43
-41
lines changed

1 file changed

+43
-41
lines changed

bin/Readme.md

Lines changed: 43 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -6,65 +6,72 @@ All the precompiled binaries provided here have extended support for
66
everything which is normally not in OpenSSL or LibreSSL -- 40+56 Bit,
77
export/ANON ciphers, weak DH ciphers, weak EC curves, SSLv2 etc. -- all the dirty
88
features needed for testing. OTOH they also come with extended support
9-
for new / advanced cipher suites and/or features which are not in the
9+
for some new / advanced cipher suites and/or features which are not in the
1010
official branch like (old version of the) CHACHA20+POLY1305 and CAMELLIA 256 bit ciphers.
11-
They also have IPv6 support, see below.
1211

13-
The (stripped) binaries this directory are all compiled from my openssl
14-
snapshot (https://github.com/drwetter/openssl) from Peter Mosman's openssl
15-
fork (https://github.com/PeterMosmans/openssl). Thx a bunch, Peter!
12+
The (stripped) binaries this directory are all compiled from my openssl snapshot
13+
(https://github.com/drwetter/openssl-1.0.2.bad) which adds a few bits to Peter
14+
Mosman's openssl fork (https://github.com/PeterMosmans/openssl). Thx a bunch, Peter!
15+
The few bits are IPv6 support (except IPV6 proxy) and some STARTTLS backports.
1616

1717
Compiled Linux and FreeBSD binaries so far come from Dirk, other
1818
contributors see ../CREDITS.md .
1919

20-
**I discontinued to upload the not commonly used binaries at github ** (ARM7l, Darwin.i386 and all except one kerberos compiles) **as it is not very appropriate to use github especially for those. The main site for all
21-
binaries is https://testssl.sh/openssl-1.0.2i-chacha.pm.ipv6.contributed/, also see the tarball @
22-
https://testssl.sh/openssl-1.0.2i-chacha.pm.ipv6.Linux+FreeBSD.tar.gz**
23-
2420
The binaries here have the naming scheme ``openssl.$(uname).$(uname -m)``
2521
and will be picked up from testssl.sh if you run testssl.sh directly
26-
off the git directory. Otherwise you need ``testssl.sh`` to point to it
22+
off the git directory. Otherwise you need ``testssl.sh`` to point to it
2723
via the argument (``--openssl=<here>``) or as an environment variable
2824
(``OPENSSL=<here> testssl.sh <yourargs>``).
2925

30-
The Linux binaries with the trailing ``-krb5`` come with Kerberos 5 support,
26+
The Linux binaries with the trailing ``-krb5`` come with Kerberos 5 support,
3127
they won't be picked up automatically as you need to make sure first they
3228
run (see libraries below).
3329

30+
Because I didn't want blow up the repo and waste disk spaces for others
31+
there are more binaries for other aerchitectures (ARM7l, Darwin.i386, ..
32+
here: https://testssl.sh/openssl-1.0.2k-chacha.pm.ipv6.Linux+FreeBSD.tar.gz
33+
and older ones here: https://testssl.sh/openssl-1.0.2i-chacha.pm.ipv6.contributed/ .
34+
35+
As there is not darwin64-arm64-cc in the old branch there is not binary for
36+
that architecture either. (FYI: patch isn't big but isn't easy to backport).
37+
38+
39+
In general the usage of this binaries became more and more of a limited
40+
value: It doesn't support e.g. TLS 1.3 and newer TLS 1.2 ciphers. OTOH servers
41+
which only offer SSLv2 and SSLv3 became less common and we use for the
42+
majority of checks in testssl.sh sockets and not this binary.
43+
3444

3545
Compiling and Usage Instructions
3646
================================
3747

3848
General
3949
-------
4050

41-
Both 64+32 bit Linux binaries were compiled under Ubuntu 12.04 LTS. Likely you
42-
cannot use them for older distributions, younger worked in all my test environments.
43-
I provide for each distributions two sets of binaries (no IPv6 here):
51+
Both 64+32 bit Linux binaries were compiled under Ubuntu 12.04 LTS(!). Likely you
52+
cannot use them for older distributions, younger worked in all my test environments
53+
(like Debian 11 and OpenSuse Tumbleweed on Q3/2022).
54+
55+
I provide two sets of binaries:
4456

4557
* completely statically linked binaries
4658
* dynamically linked binaries, additionally with MIT Kerberos support ("krb5" in the name).
47-
They provide also KRB5-* and EXP-KRB5-* support (in OpenSSL terminology, see krb5-ciphers.txt).
59+
They provide also KRB5-* and EXP-KRB5-* support (in OpenSSL terminology, see krb5-ciphers.txt).
4860

49-
For the latter you need a whopping bunch of kerberos runtime libraries which you maybe need to
50-
install from your distributor (libgssapi_krb5, libkrb5, libcom_err, libk5crypto, libkrb5support,
51-
libkeyutils). The 'static' binaries do not have MIT kerberos support as there are no
52-
static kerberos libs and I did not bother to compile them from the sources.
61+
For the latter you need a whopping bunch of kerberos runtime libraries which you maybe need to
62+
install from your distributor (libgssapi_krb5, libkrb5, libcom_err, libk5crypto, libkrb5support,
63+
libkeyutils). Despite the fact it's 2022 the openssl kerberos binary still works when compiled
64+
non-statically on a legacy VM. I didn't bother use static kerberos libs as they need to be
65+
compiled from source.
5366

5467

5568
Compilation instructions
5669
------------------------
5770

5871
If you want to compile OpenSSL yourself, here are the instructions:
5972

60-
1.) get openssl from Peter Mosmans' repo:
61-
62-
git clone https://github.com/PeterMosmans/openssl
63-
cd openssl
64-
65-
or use my repo:
66-
67-
git clone https://github.com/drwetter/openssl
73+
1.)
74+
git git clone https://github.com/drwetter/openssl-1.0.2-bad
6875
cd openssl
6976

7077

@@ -96,16 +103,11 @@ or use my repo:
96103
./config --prefix=/usr/ --openssldir=/etc/ssl enable-zlib enable-ssl2 enable-rc5 enable-rc2 \
97104
enable-GOST enable-cms enable-md2 enable-mdc2 enable-ec enable-ec2m enable-ecdh enable-ecdsa \
98105
enable-seed enable-camellia enable-idea enable-rfc3779 no-ec_nistp_64_gcc_128 \
99-
-static experimental-jpake -DOPENSSL_USE_BUILD_DATE
100-
101-
IPv6 support would need additionally the patch from ``fedora-dirk-ipv6.diff`` (included already
102-
in my branch). This doesn't give you the option of an IPv6 enabled proxy yet.
103-
It is good practice to compile those binaries with ``-DOPENSSL_USE_IPV6`` as
104-
later on you can tell them apart by``openssl version -a``.
106+
-static experimental-jpake -DOPENSSL_USE_BUILD_DATE
105107

106-
Four GOST [1][2] ciphers come via engine support automagically with this setup. Two additional GOST
107-
ciphers can be compiled in (``GOST-GOST94``, ``GOST-MD5``) with ``-DTEMP_GOST_TLS`` but as of now they make
108-
problems under some circumstances, so unless you desperately need those ciphers I would stay away from
108+
Four GOST [1][2] ciphers come via engine support automagically with this setup. Two additional GOST
109+
ciphers can be compiled in (``GOST-GOST94``, ``GOST-MD5``) with ``-DTEMP_GOST_TLS`` but as of now they make
110+
problems under some circumstances, so unless you desperately need those ciphers I would stay away from
109111
``-DTEMP_GOST_TLS``.
110112

111113
If you don't have / don't want Kerberos libraries and devel rpms/debs, just omit "--with-krb5-flavor=MIT"
@@ -118,17 +120,17 @@ If you don't have / don't want Kerberos libraries and devel rpms/debs, just omit
118120
5.) make report (check whether it runs ok!)
119121

120122
6.) ``./apps/openssl ciphers -V 'ALL:COMPLEMENTOFALL' | wc -l`` lists for me
121-
* 193(+4 GOST) ciphers including kerberos
123+
* 193(+4 GOST) ciphers including kerberos
122124
* 179(+4 GOST) ciphers without kerberos
123125

124-
as opposed to ~110 from Ubuntu or Opensuse.
126+
as opposed to ~162 from Ubuntu or Opensuse. Note that newer distributions provide
127+
newer ciphers which this old openssl-1.0.2-bad doesn't have. OTOH openssl-1.0.2-bad
128+
has a lot of legacy ciphers and protocols enabled which newer binaries don't have.
125129

126-
**Never use these binaries for anything other than testing**
130+
**Never use these binaries for anything other than testing!**
127131

128132
Enjoy, Dirk
129133

130134
[1] https://en.wikipedia.org/wiki/GOST_%29block_cipher%29
131135

132136
[2] http://fossies.org/linux/openssl/engines/ccgost/README.gost
133-
134-

0 commit comments

Comments
 (0)