Documentation for new CT s_client flags
Reviewed-by: Ben Laurie <ben@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org>
This commit is contained in:
5
CHANGES
5
CHANGES
@@ -873,6 +873,11 @@
|
|||||||
whose return value is often ignored.
|
whose return value is often ignored.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
|
*) New -noct, -requestct, -requirect and -ctlogfile options for s_client.
|
||||||
|
These allow SCTs (signed certificate timestamps) to be requested and
|
||||||
|
validated when establishing a connection.
|
||||||
|
[Rob Percival <robpercival@google.com>]
|
||||||
|
|
||||||
Changes between 1.0.2f and 1.0.2g [1 Mar 2016]
|
Changes between 1.0.2f and 1.0.2g [1 Mar 2016]
|
||||||
|
|
||||||
* Disable weak ciphers in SSLv3 and up in default builds of OpenSSL.
|
* Disable weak ciphers in SSLv3 and up in default builds of OpenSSL.
|
||||||
|
|||||||
1
NEWS
1
NEWS
@@ -39,6 +39,7 @@
|
|||||||
o Support for X25519
|
o Support for X25519
|
||||||
o Extended SSL_CONF support using configuration files
|
o Extended SSL_CONF support using configuration files
|
||||||
o KDF algorithm support. Implement TLS PRF as a KDF.
|
o KDF algorithm support. Implement TLS PRF as a KDF.
|
||||||
|
o Support for Certificate Transparency
|
||||||
|
|
||||||
Major changes between OpenSSL 1.0.2f and OpenSSL 1.0.2g [1 Mar 2016]
|
Major changes between OpenSSL 1.0.2f and OpenSSL 1.0.2g [1 Mar 2016]
|
||||||
|
|
||||||
|
|||||||
@@ -91,6 +91,8 @@ B<openssl> B<s_client>
|
|||||||
[B<-serverinfo types>]
|
[B<-serverinfo types>]
|
||||||
[B<-status>]
|
[B<-status>]
|
||||||
[B<-nextprotoneg protocols>]
|
[B<-nextprotoneg protocols>]
|
||||||
|
[B<-noct|requestct|requirect>]
|
||||||
|
[B<-ctlogfile>]
|
||||||
|
|
||||||
=head1 DESCRIPTION
|
=head1 DESCRIPTION
|
||||||
|
|
||||||
@@ -435,6 +437,23 @@ Empty list of protocols is treated specially and will cause the client to
|
|||||||
advertise support for the TLS extension but disconnect just after
|
advertise support for the TLS extension but disconnect just after
|
||||||
receiving ServerHello with a list of server supported protocols.
|
receiving ServerHello with a list of server supported protocols.
|
||||||
|
|
||||||
|
=item B<-noct|requestct|requirect>
|
||||||
|
|
||||||
|
Use one of these three options to control whether Certificate Transparency (CT)
|
||||||
|
is disabled (-noct), enabled but not enforced (-requestct), or enabled and
|
||||||
|
enforced (-requirect). If CT is enabled, signed certificate timestamps (SCTs)
|
||||||
|
will be requested from the server and invalid SCTs will cause the connection to
|
||||||
|
be aborted. If CT is enforced, at least one valid SCT from a recognised CT log
|
||||||
|
(see B<-ctlogfile>) will be required or the connection will be aborted.
|
||||||
|
|
||||||
|
Enabling CT also enables OCSP stapling, as this is one possible delivery method
|
||||||
|
for SCTs.
|
||||||
|
|
||||||
|
=item B<-ctlogfile>
|
||||||
|
|
||||||
|
A file containing a list of known Certificate Transparency logs. See
|
||||||
|
L<SSL_CTX_set_ctlog_list_file(3)> for the expected file format.
|
||||||
|
|
||||||
=back
|
=back
|
||||||
|
|
||||||
=head1 CONNECTED COMMANDS
|
=head1 CONNECTED COMMANDS
|
||||||
|
|||||||
Reference in New Issue
Block a user