Go to file
Hakase 1c70deea60 Update pre9 2018-06-27 19:37:27 +09:00
LICENSE Update LICENSE 2018-06-09 02:44:43 +09:00
README.md Update pre9 2018-06-27 19:37:27 +09:00
nginx_hpack_push.patch Some sources were missing. 2018-06-05 23:38:40 +09:00
nginx_hpack_push_fix.patch Some sources were missing. 2018-06-05 23:38:40 +09:00
openssl-equal-pre2.patch Add the pre2 version again. 2018-06-05 08:03:41 +09:00
openssl-equal-pre7.patch Add support draft 26 2018-06-18 16:43:12 +09:00
openssl-equal-pre7_ciphers.patch Add support draft 26 2018-06-18 16:43:12 +09:00
openssl-equal-pre8.patch Add support draft 26 2018-06-18 16:43:12 +09:00
openssl-equal-pre8_ciphers.patch Add support draft 26 2018-06-18 16:43:12 +09:00
openssl-equal-pre9.patch Update pre9 2018-06-27 19:37:27 +09:00
openssl-equal-pre9_ciphers.patch Update pre9 2018-06-27 19:37:27 +09:00
remove_nginx_server_header.patch Add remove server header, Update README.md 2018-06-24 23:31:13 +09:00

README.md

openssl-patch

OpenSSL Equal Preference Patch

This file is not an official OpenSSL patch. Problems can arise and this is your responsibility.

Original Sources

Information

Support TLS 1.3 draft 28 browsers - Chrome Canary, Firefox Nightly

Compatible OpenSSL-1.1.1-pre9-dev (OpenSSL, 22440 commits)

Patch files

You can find the OpenSSL 1.1.0h patch is here.

Here is the basic patch content.

  • Support TLS 1.3 draft 23 + 26 + 28 (Not support pre2)
    • Server: draft 23 + 26 + 28
    • Client: draft 23 + 26 + 27 + 28
  • BoringSSL's Equal Preference Patch
  • Weak 3DES and not using ECDHE ciphers is not used in TLSv1.1 or later.
Patch file name Patch list
openssl-equal-pre2.patch Not support draft 26, 28.
openssl-equal-pre7.patch
openssl-equal-pre8.patch
openssl-equal-pre9.patch
TLS 1.3 cipher settings can not be changed on nginx.
openssl-equal-pre7_ciphers.patch
openssl-equal-pre8_ciphers.patch
openssl-equal-pre9_ciphers.patch
TLS 1.3 cipher settings can be changed on nginx.

The "_ciphers" patch file is a temporary change to the TLS 1.3 configuration.

Example of setting TLS 1.3 cipher in nginx (pre7 or higher):

Example Ciphers
Short Cipher TLS13+AESGCM+AES128:TLS13+AESGCM+AES256:TLS13+CHACHA20
Fullname Cipher TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256
TLS 1.3 + 1.2 ciphers TLS13+AESGCM+AES128:EECDH+AES128

Not OpenSSL patch files

Patch file name Patch list
nginx_hpack_push.patch Patch both the HPACK patch and the PUSH ERROR.
nginx_hpack_push_fix.patch Patch only the PUSH ERROR of the hpack patch. (If the HPACK patch has already been completed)
remove_nginx_server_header.patch Remove nginx server header. (http2, http1.1)

nginx Configuration

HPACK Patch

Add configure option : --with-http_v2_hpack_enc

SSL Setting

ssl_protocols TLSv1 TLSv1.1 TLSv1.2 TLSv1.3;
ssl_ciphers [Copy it from below and paste it here.];
ssl_ecdh_curve X25519:P-256:P-384;
ssl_prefer_server_ciphers on;

OpenSSL-1.1.1-pre2 ciphers (draft 23)

[TLS13-AES-128-GCM-SHA256|TLS13-AES-256-GCM-SHA384|TLS13-CHACHA20-POLY1305-SHA256]:[EECDH+ECDSA+AESGCM+AES128|EECDH+ECDSA+CHACHA20]:EECDH+ECDSA+AESGCM+AES256:EECDH+ECDSA+AES128+SHA:EECDH+ECDSA+AES256+SHA:[EECDH+aRSA+AESGCM+AES128|EECDH+aRSA+CHACHA20]:EECDH+aRSA+AESGCM+AES256:EECDH+aRSA+AES128+SHA:EECDH+aRSA+AES256+SHA:RSA+AES128+SHA:RSA+AES256+SHA:RSA+3DES

OpenSSL-1.1.1-pre7~9 ciphers (draft 23, 26, 28)

[EECDH+ECDSA+AESGCM+AES128|EECDH+ECDSA+CHACHA20]:EECDH+ECDSA+AESGCM+AES256:EECDH+ECDSA+AES128+SHA:EECDH+ECDSA+AES256+SHA:[EECDH+aRSA+AESGCM+AES128|EECDH+aRSA+CHACHA20]:EECDH+aRSA+AESGCM+AES256:EECDH+aRSA+AES128+SHA:EECDH+aRSA+AES256+SHA:RSA+AES128+SHA:RSA+AES256+SHA:RSA+3DES

OpenSSL-1.1.1-pre7~9_ciphers ciphers (draft 23, 26, 28)

[TLS13+AESGCM+AES128|TLS13+AESGCM+AES256|TLS13+CHACHA20]:[EECDH+ECDSA+AESGCM+AES128|EECDH+ECDSA+CHACHA20]:EECDH+ECDSA+AESGCM+AES256:EECDH+ECDSA+AES128+SHA:EECDH+ECDSA+AES256+SHA:[EECDH+aRSA+AESGCM+AES128|EECDH+aRSA+CHACHA20]:EECDH+aRSA+AESGCM+AES256:EECDH+aRSA+AES128+SHA:EECDH+aRSA+AES256+SHA:RSA+AES128+SHA:RSA+AES256+SHA:RSA+3DES