Configure TLS cipher suites from client side

Support for security such as Firewalls and securing linux
Post Reply
IsmaRG
Posts: 4
Joined: 2024/01/08 12:05:13

Configure TLS cipher suites from client side

Post by IsmaRG » 2024/01/08 12:08:39

Hi everyone,

I was wondering how to configure specific TLS cipher suites to be offered by my CentOS system from the client side, restricting them to the ones I have chosen.

Thank you.

User avatar
TrevorH
Site Admin
Posts: 33221
Joined: 2009/09/24 10:40:56
Location: Brighton, UK

Re: Configure TLS cipher suites from client side

Post by TrevorH » 2024/01/08 12:34:04

What CentOS version?
Which specific protocol/daemon are you asking about? httpd? nginx? sshd? something else?
The future appears to be RHEL or Debian. I think I'm going Debian.
Info for USB installs on http://wiki.centos.org/HowTos/InstallFromUSBkey
CentOS 5 and 6 are deadest, do not use them.
Use the FAQ Luke

IsmaRG
Posts: 4
Joined: 2024/01/08 12:05:13

Re: Configure TLS cipher suites from client side

Post by IsmaRG » 2024/01/08 12:43:58

System version is CentOS Stream 9. I want to restrict the cipher suites at system level.

NOTE: I want to restrict the cipher suites used from the client side.

User avatar
TrevorH
Site Admin
Posts: 33221
Joined: 2009/09/24 10:40:56
Location: Brighton, UK

Re: Configure TLS cipher suites from client side

Post by TrevorH » 2024/01/08 12:58:53

`man update-crypto-policies` may help
The future appears to be RHEL or Debian. I think I'm going Debian.
Info for USB installs on http://wiki.centos.org/HowTos/InstallFromUSBkey
CentOS 5 and 6 are deadest, do not use them.
Use the FAQ Luke

BShT
Posts: 585
Joined: 2019/10/09 12:31:40

Re: Configure TLS cipher suites from client side

Post by BShT » 2024/01/08 13:48:18

If you set a restrictive server-side configuration, the client is forced to use

IsmaRG
Posts: 4
Joined: 2024/01/08 12:05:13

Re: Configure TLS cipher suites from client side

Post by IsmaRG » 2024/01/08 14:25:16

Hi all,

I need to restrict the cipher suites from client side because I dont have access to server´s configuration.

I already used update-crypto-policies command, but my system is still offering 31 cipher suites in Client Hello.

BShT
Posts: 585
Joined: 2019/10/09 12:31:40

Re: Configure TLS cipher suites from client side

Post by BShT » 2024/01/08 14:29:19

/etc/crypto-policies/back-ends/openssh.config

User avatar
jlehtone
Posts: 4532
Joined: 2007/12/11 08:17:33
Location: Finland

Re: Configure TLS cipher suites from client side

Post by jlehtone » 2024/01/08 14:32:04

IsmaRG wrote:
2024/01/08 14:25:16
31 cipher suites in Client Hello.
What is "Client Hello"?

The man update-crypto-policies lists these back-ends:
• GnuTLS library (GnuTLS, SSL, TLS)
• OpenSSL library (OpenSSL, SSL, TLS)
• NSS library (NSS, SSL, TLS)
• OpenJDK (java-tls, SSL, TLS)
• Libkrb5 (krb5, kerberos)
• BIND (BIND, DNSSec)
• OpenSSH (OpenSSH, SSH)
• Libreswan (libreswan, IKE, IPSec)
• libssh (libssh, SSH)

Does the "Client Hello" use one of these? If not, then you have to configure it in whatever way it is configured.


Note though that if the user can supply config for the client -- for example user of 'ssh' can do so -- then your system config is a mere default and not a strict restriction.

IsmaRG
Posts: 4
Joined: 2024/01/08 12:05:13

Re: Configure TLS cipher suites from client side

Post by IsmaRG » 2024/01/08 16:42:38

With "Client Hello" I meant Client Hello from TLS Handshake. I tried modifying every backend and doesn´t seem to work, my system is still offering 31 cipher suites.

User avatar
TrevorH
Site Admin
Posts: 33221
Joined: 2009/09/24 10:40:56
Location: Brighton, UK

Re: Configure TLS cipher suites from client side

Post by TrevorH » 2024/01/08 18:05:58

So back to the question I asked first of all, which service are you trying to change?
The future appears to be RHEL or Debian. I think I'm going Debian.
Info for USB installs on http://wiki.centos.org/HowTos/InstallFromUSBkey
CentOS 5 and 6 are deadest, do not use them.
Use the FAQ Luke

Post Reply