SSL Cipher Suites
  • 29 Nov 2024
  • 2 Minutes à lire
  • Sombre
    Lumière
  • PDF

SSL Cipher Suites

  • Sombre
    Lumière
  • PDF

The content is currently unavailable in French. You are viewing the default English version.
Résumé de l’article

SSL cipher suites can be used with SOAP and SEAL communicator modules. OneSpan Authentication Server supports SSL cipher suites defined under the security level labels Custom, Very High, High, Medium, and Low.

The security levels are applied to the following communication protocols:

  • SOAP
  • SEAL
  • RADIUS (RADIUS/EAP-TTLS and RADIUS/PEAP only)
  Table: Cryptographic protocols supported in different cipher suite security levels
SSL cipher suite security levelCryptographic protocol support
TLSv1TLSv1.1TLSv1.2TLSv1.3
Very High
High
Medium
Low
Custom

Default security levels for SSL cipher suites

For each communication interface of OneSpan Authentication Server, the SSL cipher suite security level is set by default (see Table: Default SSL cipher suite security levels for communication interfaces).

  Table:  Default SSL cipher suite security levels for communication interfaces
OneSpan Authentication Server communication interfaceDefault security level of SSL cipher suite
OneSpan Authentication Server SOAP CommunicatorVery High
OneSpan Authentication Server SEAL Communicator with SSL/TLSVery High
OneSpan Authentication Server RADIUS CommunicatorMedium
OneSpan Authentication Server Live Audit Connection (SEAL)Very High
Message Delivery Component (SEAL)Very High

You can configure a communicator module that is enabled with SSL/TLS to use an SSL cipher security level other than the default level and select either Very High, High, Medium, or Low, via the Configuration Utility. To do so, launch the Configuration Utility and navigate to Communicators. There, each communicator module (SOAP, RADIUS, SEAL) has its own tab where you can select an option from the SSL Cipher Suite Security Level drop-down list. Alternatively, you can set this same setting via the Administration Web Interface.

Custom SSL cipher suites

A custom list of cipher suites can be defined specifically for OneSpan Authentication Server. The format of the list is defined by OpenSSL.

Each lower security level contains the cipher suites of every higher level, too. In the following table, only the cipher suites specific to each level are listed.

The cipher suite security levels define rules which protocols, protocol versions, and algorithms are allowed for a specific level, the resulting cipher lists depend on the OpenSSL library. This means that even if a higher cipher suite level defines stricter rules than a lower one, the applicable ciphers may be the same.

For instance, Very High is stricter than High, but effectively both levels allow the same ciphers. In that case, it does not make a difference, which cipher suite security level you select. The same is true for Medium and Low.

  Table: Supported SSL cipher suites
Cipher suiteProtocolKey exchangeAuthenti­cationEncryptionMAC
Security Level: VERY_HIGH, HIGH
TLS_AES_256_GCM_SHA384TLSv1.3AnyAnyAESGCM(256)AEAD
TLS_CHACHA20_POLY1305_SHA256TLSv1.3AnyAnyCHACHA20 POLY1305(256)AEAD
TLS_AES_128_GCM_SHA256TLSv1.3AnyAnyAESGCM(128)AEAD
ECDHE-RSA-AES128-GCM-SHA256TLSv1.2ECDHRSAAESGCM(128)AEAD
AES128-GCM-SHA256TLSv1.2RSARSAAESGCM(128)AEAD
ECDHE-RSA-AES256-GCM-SHA384TLSv1.2ECDHRSAAESGCM(256)AEAD
AES256-GCM-SHA384TLSv1.2RSARSAAESGCM(256)AEAD
Security Level: MEDIUM, LOW
ECDHE-RSA-AES128-SHA256TLSv1.2ECDHRSAAES(128)SHA256
ECDHE-RSA-AES128-SHATLSv1.2, TLSv1.1, TLSv1ECDHRSAAES(128)SHA1
AES128-CCM8TLSv1.2RSARSAAESCCM8(128)AEAD
AES128-CCMTLSv1.2RSARSAAESCCM(128)AEAD
AES128-SHA256TLSv1.2RSARSAAES(128)SHA256
AES128-SHATLSv1.2, TLSv1.1, TLSv1RSARSAAES(128)SHA1
ECDHE-RSA-AES256-SHA384TLSv1.2ECDHRSAAES(256)SHA384
ECDHE-RSA-AES256-SHATLSv1.2, TLSv1.1, TLSv1ECDHRSAAES(256)SHA1
AES256-CCM8TLSv1.2RSARSAAESCCM8(256)AEAD
AES256-CCMTLSv1.2RSARSAAESCCM(256)AEAD
AES256-SHA256TLSv1.2RSARSAAES(256)SHA256
AES256-SHATLSv1.2, TLSv1.1, TLSv1RSARSAAES(256)SHA1

Blocked cipher suites

The OneSpan Authentication Server communication interfaces, when configured to use SSL/TLS, will actively block certain cipher suites. All OneSpan Authentication Server components actively block the suites to which the criteria listed below apply. This also includes custom cipher suites, i.e. if the criteria also apply to custom-defined cipher suites, the OneSpan Authentication Server components will also actively block these suites.

Criteria for cipher suites to be blocked:

  • All cipher suites which do not offer encryption
  • All cipher suites which do not offer authentication
  • All export encryption algorithms
  • Cipher suites defined by OpenSSL as low encryption
  • All cipher suites which use MD5 as hashing algorithm
  • All cipher suites that use pre-shared keys

Cipher suites in OneSpan Authentication Server Administration Web Interface

The following cipher suites are accepted by the Administration Web Interface(if deployed on an Apache Tomcat server (i.e. the default deployment)):

  Table: Cipher suites in Administration Web Interface
Cipher suiteProtocolKey exchangeAuthenticationEncryptionMAC
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256TLSv1.2ECDHRSAAESGCM(128)AEAD
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256TLSv1.2ECDHECDSAAESGCM(128)AEAD
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256TLSv1.2ECDH/RSAECDHAESGCM(128)AEAD
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256TLSv1.2ECDH/ECDSAECDHAESGCM(128)AEAD
TLS_RSA_WITH_AES_128_GCM_SHA256TLSv1.2RSARSAAESGCM(128)AEAD
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384*TLSv1.2ECDHRSAAESGCM(256)AEAD
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384*TLSv1.2ECDHECDSAAESGCM(256)AEAD
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384*TLSv1.2ECDH/RSAECDHAESGCM(256)AEAD
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384*TLSv1.2ECDH/ECDSAECDHAESGCM(256)AEAD
TLS_RSA_WITH_AES_256_GCM_SHA384*TLSv1.2RSARSAAESGCM(256)AEAD

* Encryption of symmetric keys that are 128 bit or greater require Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files.


Cet article vous a-t-il été utile ?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Ozzy, facilitant la découverte de connaissances grâce à l’intelligence conversationnelle