ECDSA cipher suites support 编辑

ECDSA cipher suites use elliptical curve cryptography (ECC). Because of its smaller size, it is helpful in environments where processing power, storage space, bandwidth, and power consumption are constrained.

When the ECDHE_ECDSA cipher group is used, the server’s certificate must contain an ECDSA-capable public key.

The following table lists the ECDSA ciphers that are supported on the Citrix ADC MPX and SDX appliances with N3 chips, Citrix ADC VPX appliances, MPX 5900/26000, and MPX/SDX 8900/15000 appliances.

Cipher NamePriorityDescriptionKey Exchange AlgorithmAuthentication AlgorithmEncryption Algorithm (Key Size)Message Authentication Code (MAC) AlgorithmHexCode
TLS1-ECDHE-ECDSA-AES128-SHA1SSLv3ECC-DHEECDSAAES(128)SHA10xc009
TLS1-ECDHE-ECDSA-AES256-SHA2SSLv3ECC-DHEECDSAAES(256)SHA10xc00a
TLS1.2-ECDHE-ECDSA-AES128-SHA2563TLSv1.2ECC-DHEECDSAAES(128)SHA-2560xc023
TLS1.2-ECDHE-ECDSA-AES256-SHA3844TLSv1.2ECC-DHEECDSAAES(256)SHA-3840xc024
TLS1.2-ECDHE-ECDSA-AES128-GCM-SHA2565TLSv1.2ECC-DHEECDSAAES-GCM(128)SHA-2560xc02b
TLS1.2-ECDHE-ECDSA-AES256-GCM-SHA3846TLSv1.2ECC-DHEECDSAAES-GCM(256)SHA-3840xc02c
TLS1-ECDHE-ECDSA-RC4-SHA7SSLv3ECC-DHEECDSARC4(128)SHA10xc007
TLS1-ECDHE-ECDSA-DES-CBC3-SHA8SSLv3ECC-DHEECDSA3DES(168)SHA10xc008
TLS1.2-ECDHE-ECDSA-CHACHA20-POLY13059TLSv1.2ECC-DHEECDSACHACHA20/POLY1305(256)AEAD0xcca9

ECDSA/RSA cipher and certificate selection

You can bind both ECDSA and RSA server certificates at the same time to an SSL virtual server. When both ECDSA and RSA certificates are bound to the virtual server, it automatically selects the appropriate server certificate to present to the client. If the client cipher list includes RSA ciphers, but does not include ECDSA ciphers, the virtual server presents the RSA server certificate. If both ciphers are present in the client’s list, then the server certificate presented depends on the cipher priority set on the virtual server. That is, if RSA has a higher priority, the RSA certificate is presented. If ECDSA has a higher priority, the ECDSA certificate is presented to the client.

Client authentication by using an ECDSA or an RSA certificate

For client authentication, the CA certificate bound to the virtual server can be ECDSA or RSA signed. The appliance supports a mixed certificate chain. For example, the following certificate chain is supported.

Client certificate (ECDSA) <-> CA certificate (RSA) <-> Intermediate certificate (RSA) <-> Root certificate (RSA)

The following table shows the elliptical curves supported on the different Citrix ADC appliances with ECDSA cipher groups and ECDSA certificates:

Elliptical curvesPlatforms supported
prime256v1All platforms, including FIPS.
secp384r1All platforms, including FIPS.
secp521r1MPX 5900, MPX/SDX 8900, MPX/SDX 15000, MPX/SDX 26000, VPX
secp224r1MPX 5900, MPX/SDX 8900. MPX/SDX 15000, MPX/SDX 26000, VPX

Create an ECDSA certificate-key pair

You can create an ECDSA certificate-key pair directly on a Citrix ADC appliance by using the CLI or the GUI. Earlier, you were able to install and bind an ECC certificate-key pair on the appliance, but you had to use OpenSSL to create a certificate-key pair.

Only P_256 and P_384 curves are supported.

Note

This support is available on all platforms except MPX 9700/1050/12500/15500.

To create an ECDSA certificate-key pair by using the CLI:

At the command prompt, type:

create ssl ecdsaKey <keyFile> -curve ( P_256 | P_384 ) [-keyform ( DER | PEM )] [-des | -des3] {-password } [-pkcs8]
<!--NeedCopy-->

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。
列表为空,暂无数据

词条统计

浏览:29 次

字数:5888

最后编辑:8年前

编辑次数:0 次

    我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
    原文