mirror of
https://github.com/guanzhi/GmSSL.git
synced 2026-05-13 11:56:28 +08:00
translation
This commit is contained in:
@@ -30,6 +30,9 @@ The B<ciphers> command converts textual GmSSL cipher lists into ordered
|
||||
SSL cipher preference lists. It can be used as a test tool to determine
|
||||
the appropriate cipherlist.
|
||||
|
||||
ciphers命令将GmSSL文本密码列表转换成有序的SSL密码偏好列表。它可以用作测试工具
|
||||
来决定适当的密码列表。
|
||||
|
||||
=head1 OPTIONS
|
||||
|
||||
=over 4
|
||||
@@ -38,6 +41,8 @@ the appropriate cipherlist.
|
||||
|
||||
Print a usage message.
|
||||
|
||||
打印使用信息。
|
||||
|
||||
=item B<-s>
|
||||
|
||||
Only list supported ciphers: those consistent with the security level, and
|
||||
@@ -55,58 +60,89 @@ depending on the configured certificates and presence of DH parameters.
|
||||
If this option is not used then all ciphers that match the cipherlist will be
|
||||
listed.
|
||||
|
||||
只列出了支持的密码:那些与安全级别一致的密码,最小和最大的协议版本。
|
||||
这更接近应用程序将支持的实际密码列表。
|
||||
默认情况下,PSK和SRP密码未启用
|
||||
它也不会更改支持的签名算法的默认列表。
|
||||
在服务器上,支持的密码列表也可能会根据配置的证书和DH参数的存在来排除其他密码。
|
||||
如果不使用此选项,则将列出与密码列表匹配的所有密码。
|
||||
|
||||
=item B<-psk>
|
||||
|
||||
When combined with B<-s> includes cipher suites which require PSK.
|
||||
|
||||
当与-s组合时包含了需要PSK的密码套件。
|
||||
|
||||
=item B<-srp>
|
||||
|
||||
When combined with B<-s> includes cipher suites which require SRP.
|
||||
|
||||
当与-s组合时包含了需要SRP的密码套件。
|
||||
|
||||
=item B<-v>
|
||||
|
||||
Verbose output: For each ciphersuite, list details as provided by
|
||||
L<SSL_CIPHER_description(3)>.
|
||||
|
||||
详细的列出所有加密套件。
|
||||
|
||||
=item B<-V>
|
||||
|
||||
Like B<-v>, but include the official cipher suite values in hex.
|
||||
|
||||
和-v相似,但包含十六进制官方密码套件。
|
||||
|
||||
=item B<-tls1_3>
|
||||
|
||||
In combination with the B<-s> option, list the ciphers which would be used if
|
||||
TLSv1.3 were negotiated.
|
||||
|
||||
结合了-s选项。列出了如果TVSv1.3达成协议要使用的密码。
|
||||
|
||||
=item B<-tls1_2>
|
||||
|
||||
In combination with the B<-s> option, list the ciphers which would be used if
|
||||
TLSv1.2 were negotiated.
|
||||
|
||||
结合了-s选项。列出了如果TVSv1.2达成协议要使用的密码。
|
||||
|
||||
=item B<-ssl3>
|
||||
|
||||
In combination with the B<-s> option, list the ciphers which would be used if
|
||||
SSLv3 were negotiated.
|
||||
|
||||
结合了-s选项。列出了如果SSLv3达成协议要使用的密码。
|
||||
|
||||
=item B<-tls1>
|
||||
|
||||
In combination with the B<-s> option, list the ciphers which would be used if
|
||||
TLSv1 were negotiated.
|
||||
|
||||
结合了-s选项。列出了如果TVSv1达成协议要使用的密码。
|
||||
|
||||
|
||||
=item B<-tls1_1>
|
||||
|
||||
In combination with the B<-s> option, list the ciphers which would be used if
|
||||
TLSv1.1 were negotiated.
|
||||
|
||||
结合了-s选项。列出了如果TVSv1.1达成协议要使用的密码。
|
||||
|
||||
|
||||
=item B<-stdname>
|
||||
|
||||
precede each ciphersuite by its standard name: only available is GmSSL
|
||||
is built with tracing enabled (B<enable-ssl-trace> argument to Configure).
|
||||
|
||||
在每个密码套件之前加上其标准名称:只有可用的GmSSL是使用跟踪启用(enable-ssl-trace参数配置)构建的。
|
||||
|
||||
=item B<cipherlist>
|
||||
|
||||
a cipher list to convert to a cipher preference list. If it is not included
|
||||
then the default cipher list will be used. The format is described below.
|
||||
|
||||
一个用于转换为密码偏好列表的密码表。如果不包括,那么将使用默认密码列表。格式如下所述。
|
||||
|
||||
=back
|
||||
|
||||
=head1 CIPHER LIST FORMAT
|
||||
@@ -152,6 +188,30 @@ cipher list in order of encryption algorithm key length.
|
||||
The cipher string B<@SECLEVEL=n> can be used at any point to set the security
|
||||
level to B<n>.
|
||||
|
||||
密码列表由一个或多个由冒号分隔的密码串组成。逗号或空格也是可接受的分隔符,但通常使用冒号。
|
||||
|
||||
实际的密码串可以采取几种不同的形式。
|
||||
|
||||
它可以由单个加密套件组成,如RC4-SHA。
|
||||
|
||||
它可以表示包含某种算法或某种类型的密码套件的密码套件列表。例如,SHA1表示使用摘要算法SHA1的所有密码套件,SSLv3表示所有SSL v3算法。
|
||||
|
||||
密码套件列表可以使用+字符组合在单个密码字符串中。这被用作逻辑和操作。例如,SHA1 + DES表示包含SHA1和DES算法的所有密码套件。
|
||||
|
||||
每个密码字符串都可以前面加上字符!, - 或+。
|
||||
|
||||
如果!然后使用密码从列表中永久删除。删除的密码永远不会重新出现在列表中,即使它们被明确声明。
|
||||
|
||||
如果使用,则从列表中删除密码,但是可以通过稍后的选项再次添加一些或所有密码。
|
||||
|
||||
如果使用+,则将密码移动到列表的末尾。此选项不会添加任何新的密码,它只是移动匹配现有的密码。
|
||||
|
||||
如果这些字符都不存在,则该字符串将被解释为要附加到当前偏好列表的密码列表。如果列表中包含已经存在的任何密码,那么它们将被忽略:它们不会移动到列表的末尾。
|
||||
|
||||
可以在任何时候使用密码字符串@STRENGTH按照加密算法密钥长度的顺序对当前密码列表进行排序。
|
||||
|
||||
可以在任何时候使用密码字符串@ SECLEVEL = n来将安全级别设置为n。
|
||||
|
||||
=head1 CIPHER STRINGS
|
||||
|
||||
The following is a list of all permitted cipher strings and their meanings.
|
||||
@@ -165,6 +225,8 @@ This is determined at compile time and is normally
|
||||
B<ALL:!COMPLEMENTOFDEFAULT:!eNULL>.
|
||||
When used, this must be the first cipherstring specified.
|
||||
|
||||
默认密码列表。 这是在编译时确定的,通常是ALL:!COMPLEMENTOFDEFAULT:!eNULL。 使用时,必须是指定的第一个密码。
|
||||
|
||||
=item B<COMPLEMENTOFDEFAULT>
|
||||
|
||||
The ciphers included in B<ALL>, but not enabled by default. Currently
|
||||
@@ -173,32 +235,45 @@ not cover B<eNULL>, which is not included by B<ALL> (use B<COMPLEMENTOFALL> if
|
||||
necessary). Note that RC4 based ciphersuites are not built into GmSSL by
|
||||
default (see the enable-weak-ssl-ciphers option to Configure).
|
||||
|
||||
密码包含在ALL中,但默认情况下未启用。 目前这包括所有RC4和匿名密码。 请注意,此规则不涵盖eNULL(不包括在所有内容中)(如有必要,请使用COMPLEMENTOFALL)。 请注意,默认情况下,基于RC4的密码套件不会内置到GmSSL中(请参阅配置的enable-weak-ssl-ciphers选项)。
|
||||
|
||||
=item B<ALL>
|
||||
|
||||
All cipher suites except the B<eNULL> ciphers (which must be explicitly enabled
|
||||
if needed).
|
||||
As of GmSSL 1.0.0, the B<ALL> cipher suites are sensibly ordered by default.
|
||||
|
||||
除eNULL密码之外的所有密码套件(必要时必须明确启用)。 从GmSSL 1.0.0开始,默认情况下,ALL密码套件被明确地排序。
|
||||
|
||||
=item B<COMPLEMENTOFALL>
|
||||
|
||||
The cipher suites not enabled by B<ALL>, currently B<eNULL>.
|
||||
|
||||
密码套件未被ALL启用,目前为eNULL
|
||||
|
||||
=item B<HIGH>
|
||||
|
||||
"high" encryption cipher suites. This currently means those with key lengths
|
||||
larger than 128 bits, and some cipher suites with 128-bit keys.
|
||||
|
||||
“高”加密密码套件。 这当前是指密钥长度大于128位的密码,
|
||||
以及一些128位密钥的密码套件。
|
||||
|
||||
=item B<MEDIUM>
|
||||
|
||||
"medium" encryption cipher suites, currently some of those using 128 bit
|
||||
encryption.
|
||||
|
||||
“中”加密密码套件,目前有些使用128位加密。
|
||||
|
||||
=item B<LOW>
|
||||
|
||||
"low" encryption cipher suites, currently those using 64 or 56 bit
|
||||
encryption algorithms but excluding export cipher suites. All these
|
||||
ciphersuites have been removed as of GmSSL 1.1.0.
|
||||
|
||||
“低”加密密码套件,目前使用64或56位加密算法,但不包括导出密码套件。 所有这些密码套件已经从GmSSL 1.1.0移除。
|
||||
|
||||
=item B<eNULL>, B<NULL>
|
||||
|
||||
The "NULL" ciphers that is those offering no encryption. Because these offer no
|
||||
@@ -208,6 +283,8 @@ Be careful when building cipherlists out of lower-level primitives such as
|
||||
B<kRSA> or B<aECDSA> as these do overlap with the B<eNULL> ciphers. When in
|
||||
doubt, include B<!eNULL> in your cipherlist.
|
||||
|
||||
“NULL”密码是不提供加密功能的密码。 因为这些不提供任何加密,并且是一个安全风险,它们不能通过DEFAULT或ALL密码字符串启用。 从低级原语(如kRSA或aECDSA)构建密码列表时要小心,因为它们与eNULL密码重叠。 如有疑问,请在您的密码列表中加入!eNULL。
|
||||
|
||||
=item B<aNULL>
|
||||
|
||||
The cipher suites offering no authentication. This is currently the anonymous
|
||||
@@ -219,58 +296,83 @@ Be careful when building cipherlists out of lower-level primitives such as
|
||||
B<kDHE> or B<AES> as these do overlap with the B<aNULL> ciphers.
|
||||
When in doubt, include B<!aNULL> in your cipherlist.
|
||||
|
||||
密码套件不提供认证。 这是目前的匿名DH算法和匿名ECDH算法。 这些密码套件容易受到“中间人”攻击,所以不鼓励使用它们。 这些被排除在DEFAULT密码之外,但被包含在ALL密码中。 在使用kDHE或AES等低级原语构建密码列表时要小心,因为它们与aNULL密码重叠。 如有疑问,请在您的密码列表中加入!aNULL。
|
||||
|
||||
=item B<kRSA>, B<aRSA>, B<RSA>
|
||||
|
||||
Cipher suites using RSA key exchange, authentication or either respectively.
|
||||
|
||||
密码套件使用RSA密钥交换,认证或分别。
|
||||
|
||||
=item B<kDHr>, B<kDHd>, B<kDH>
|
||||
|
||||
Cipher suites using static DH key agreement and DH certificates signed by CAs
|
||||
with RSA and DSS keys or either respectively.
|
||||
All these cipher suites have been removed in GmSSL 1.1.0.
|
||||
|
||||
使用静态DH密钥协议的密码套件和由CA与RSA和DSS密钥分别签署的DH证书。 所有这些密码套件已在GmSSL 1.1.0中删除。
|
||||
|
||||
=item B<kDHE>, B<kEDH>, B<DH>
|
||||
|
||||
Cipher suites using ephemeral DH key agreement, including anonymous cipher
|
||||
suites.
|
||||
|
||||
密码套件使用短暂的DH密钥协议,包括匿名密码套件。
|
||||
|
||||
=item B<DHE>, B<EDH>
|
||||
|
||||
Cipher suites using authenticated ephemeral DH key agreement.
|
||||
|
||||
密码套件使用经认证的短时DH密钥协议。
|
||||
|
||||
=item B<ADH>
|
||||
|
||||
Anonymous DH cipher suites, note that this does not include anonymous Elliptic
|
||||
Curve DH (ECDH) cipher suites.
|
||||
|
||||
匿名DH密码套件,请注意,这不包括匿名椭圆曲线DH(ECDH)密码套件。
|
||||
|
||||
=item B<kEECDH>, B<kECDHE>, B<ECDH>
|
||||
|
||||
Cipher suites using ephemeral ECDH key agreement, including anonymous
|
||||
cipher suites.
|
||||
|
||||
密码套件使用短暂的ECDH密钥协议,包括匿名密码套件。
|
||||
|
||||
=item B<ECDHE>, B<EECDH>
|
||||
|
||||
Cipher suites using authenticated ephemeral ECDH key agreement.
|
||||
|
||||
密码套件使用经认证的短暂ECDH密钥协议。
|
||||
|
||||
=item B<AECDH>
|
||||
|
||||
Anonymous Elliptic Curve Diffie-Hellman cipher suites.
|
||||
|
||||
匿名椭圆曲线Diffie-Hellman密码套件。
|
||||
|
||||
=item B<aDSS>, B<DSS>
|
||||
|
||||
Cipher suites using DSS authentication, i.e. the certificates carry DSS keys.
|
||||
|
||||
使用DSS认证的密码套件,即证书携带DSS密钥.
|
||||
|
||||
=item B<aDH>
|
||||
|
||||
Cipher suites effectively using DH authentication, i.e. the certificates carry
|
||||
DH keys.
|
||||
All these cipher suites have been removed in GmSSL 1.1.0.
|
||||
|
||||
密码套件有效地使用DH认证,即证书携带DH密钥。
|
||||
所有这些密码套件已在GmSSL 1.1.0中删除。
|
||||
|
||||
=item B<aECDSA>, B<ECDSA>
|
||||
|
||||
Cipher suites using ECDSA authentication, i.e. the certificates carry ECDSA
|
||||
keys.
|
||||
|
||||
使用ECDSA身份验证的密码套件,即证书包含ECDSA键。
|
||||
|
||||
=item B<TLSv1.2>, B<TLSv1.0>, B<SSLv3>
|
||||
|
||||
Lists ciphersuites which are only supported in at least TLS v1.2, TLS v1.0 or
|
||||
@@ -282,15 +384,21 @@ then both TLSv1.0 and SSLv3.0 ciphersuites are available.
|
||||
Note: these cipher strings B<do not> change the negotiated version of SSL or
|
||||
TLS, they only affect the list of available cipher suites.
|
||||
|
||||
|
||||
|
||||
=item B<AES128>, B<AES256>, B<AES>
|
||||
|
||||
cipher suites using 128 bit AES, 256 bit AES or either 128 or 256 bit AES.
|
||||
|
||||
密码套件使用128位AES,256位AES或128或256位AES。
|
||||
|
||||
=item B<AESGCM>
|
||||
|
||||
AES in Galois Counter Mode (GCM): these ciphersuites are only supported
|
||||
in TLS v1.2.
|
||||
|
||||
AES在Galois计数器模式(GCM)中:这些密码器仅在TLS v1.2中支持。
|
||||
|
||||
=item B<AESCCM>, B<AESCCM8>
|
||||
|
||||
AES in Cipher Block Chaining - Message Authentication Mode (CCM): these
|
||||
@@ -298,86 +406,127 @@ ciphersuites are only supported in TLS v1.2. B<AESCCM> references CCM
|
||||
cipher suites using both 16 and 8 octet Integrity Check Value (ICV)
|
||||
while B<AESCCM8> only references 8 octet ICV.
|
||||
|
||||
密码块链中的AES - 消息认证模式(CCM):TLS v1.2中仅支持这些密码。 AESCCM参考CCM密码套件,使用16和8个字节的完整性检查值(ICV),而AESCCM8仅引用8个八位字节的ICV。
|
||||
|
||||
=item B<CAMELLIA128>, B<CAMELLIA256>, B<CAMELLIA>
|
||||
|
||||
cipher suites using 128 bit CAMELLIA, 256 bit CAMELLIA or either 128 or 256 bit
|
||||
CAMELLIA.
|
||||
|
||||
密码套件使用128位CAMELLIA,256位CAMELLIA或128或256位CAMELLIA。
|
||||
|
||||
=item B<CHACHA20>
|
||||
|
||||
cipher suites using ChaCha20.
|
||||
|
||||
密码套件使用ChaCha20。
|
||||
|
||||
=item B<3DES>
|
||||
|
||||
cipher suites using triple DES.
|
||||
|
||||
密码套件使用三重DES
|
||||
|
||||
=item B<DES>
|
||||
|
||||
Cipher suites using DES (not triple DES).
|
||||
All these cipher suites have been removed in GmSSL 1.1.0.
|
||||
|
||||
密码套件使用DES(不是三重DES)。 所有这些密码套件已在GmSSL 1.1.0中删除。
|
||||
|
||||
=item B<RC4>
|
||||
|
||||
Cipher suites using RC4.
|
||||
|
||||
密码套件使用RC4
|
||||
|
||||
=item B<RC2>
|
||||
|
||||
Cipher suites using RC2.
|
||||
|
||||
密码套件使用RC2
|
||||
|
||||
=item B<IDEA>
|
||||
|
||||
Cipher suites using IDEA.
|
||||
|
||||
密码套件使用IDEA
|
||||
|
||||
=item B<SEED>
|
||||
|
||||
Cipher suites using SEED.
|
||||
|
||||
密码套件使用SEED
|
||||
|
||||
=item B<MD5>
|
||||
|
||||
Cipher suites using MD5.
|
||||
|
||||
密码套件使用MD5
|
||||
|
||||
=item B<SHA1>, B<SHA>
|
||||
|
||||
Cipher suites using SHA1.
|
||||
|
||||
密码套件使用SHA1
|
||||
|
||||
=item B<SHA256>, B<SHA384>
|
||||
|
||||
Ciphersuites using SHA256 or SHA384.
|
||||
Cipher suites using SHA256 or SHA384.
|
||||
|
||||
密码套件使用SHA256或SHA384
|
||||
|
||||
=item B<aGOST>
|
||||
|
||||
Cipher suites using GOST R 34.10 (either 2001 or 94) for authentication
|
||||
(needs an engine supporting GOST algorithms).
|
||||
|
||||
密码套件使用GOST R34.10(2001或94)用来认证
|
||||
|
||||
=item B<aGOST01>
|
||||
|
||||
Cipher suites using GOST R 34.10-2001 authentication.
|
||||
|
||||
密码套件采用GOST R 34.10-2001认证。
|
||||
|
||||
=item B<kGOST>
|
||||
|
||||
Cipher suites, using VKO 34.10 key exchange, specified in the RFC 4357.
|
||||
|
||||
密码套件,使用VKO 34.10密钥交换,在RFC 4357中规定。
|
||||
|
||||
=item B<GOST94>
|
||||
|
||||
Cipher suites, using HMAC based on GOST R 34.11-94.
|
||||
|
||||
密码套件,使用基于GOST R 34.11-94的HMAC。
|
||||
|
||||
=item B<GOST89MAC>
|
||||
|
||||
Cipher suites using GOST 28147-89 MAC B<instead of> HMAC.
|
||||
|
||||
密码套件使用GOST 28147-89 MAC B <代替> HMAC。
|
||||
|
||||
=item B<PSK>
|
||||
|
||||
All cipher suites using pre-shared keys (PSK).
|
||||
|
||||
所有使用预共享密钥(PSK)的密码套件。
|
||||
|
||||
=item B<kPSK>, B<kECDHEPSK>, B<kDHEPSK>, B<kRSAPSK>
|
||||
|
||||
Cipher suites using PSK key exchange, ECDHE_PSK, DHE_PSK or RSA_PSK.
|
||||
|
||||
密码套件使用PSK密钥交换,ECDHE_PSK,DHE_PSK或RSA_PSK。
|
||||
|
||||
=item B<aPSK>
|
||||
|
||||
Cipher suites using PSK authentication (currently all PSK modes apart from
|
||||
RSA_PSK).
|
||||
|
||||
使用PSK认证的密码套件(目前除了所有的PSK模式
|
||||
RSA_PSK)。
|
||||
|
||||
=item B<SUITEB128>, B<SUITEB128ONLY>, B<SUITEB192>
|
||||
|
||||
Enables suite B mode of operation using 128 (permitting 192 bit mode by peer)
|
||||
@@ -393,6 +542,8 @@ used and only the two suite B compliant ciphersuites
|
||||
(ECDHE-ECDSA-AES128-GCM-SHA256 and ECDHE-ECDSA-AES256-GCM-SHA384) are
|
||||
permissible.
|
||||
|
||||
启用套件B的操作模式,使用128位(允许对等体的192位模式)128位(不允许192位对等)或192位级别的安全性。 如果使用这些密码应该首先出现在密码列表中,并且忽略它们之后的任何内容。 设置Suite B模式需要符合RFC6460所需的其他后果。 特别地,支持的签名算法被简化为仅支持ECDSA和SHA256或SHA384,仅可以使用椭圆曲线P-256和P-384,并且只能使用两个套件B兼容密码(ECDHE-ECDSA-AES128-GCM-SHA256和 ECDHE-ECDSA-AES256-GCM-SHA384)。
|
||||
|
||||
=back
|
||||
|
||||
=head1 CIPHER SUITE NAMES
|
||||
|
||||
Reference in New Issue
Block a user