From e005f5fe788da046dc0b626bbed56249e7b64c83 Mon Sep 17 00:00:00 2001 From: Lidia Zuin <102308961+lidiazuin@users.noreply.github.com> Date: Tue, 18 Jul 2023 11:08:50 +0200 Subject: [PATCH] Removing obsolete encryption arguments (#907) --- modules/ROOT/pages/security/ssl-framework.adoc | 10 ---------- 1 file changed, 10 deletions(-) diff --git a/modules/ROOT/pages/security/ssl-framework.adoc b/modules/ROOT/pages/security/ssl-framework.adoc index 310b3425b..66afce167 100644 --- a/modules/ROOT/pages/security/ssl-framework.adoc +++ b/modules/ROOT/pages/security/ssl-framework.adoc @@ -169,26 +169,16 @@ openssl pkcs8 -topk8 -v2 aes-256-cbc -v2prf hmacWithSHA512 -in pkcs1or8.key -out ---- .Supported encryption arguments to openssl are: -* `-v1 PBE-MD5-DES` -* `-v1 PBE-SHA1-3DES` -* `-v1 PBE-SHA1-RC2-40` -* `-v1 PBE-SHA1-RC2-128` -* `-v1 PBE-SHA1-RC4-40` -* `-v1 PBE-SHA1-RC4-128` -* `-v1 PBE-SHA1-2DES` * `-v2 aes-128-cbc -v2prf hmacWithSHA1` * `-v2 aes-128-cbc -v2prf hmacWithSHA224` * `-v2 aes-128-cbc -v2prf hmacWithSHA256` * `-v2 aes-128-cbc -v2prf hmacWithSHA384` * `-v2 aes-128-cbc -v2prf hmacWithSHA512` -* `-v2 aes-256-cbc -v2prf hmacWithSHA1` * `-v2 aes-256-cbc -v2prf hmacWithSHA224` * `-v2 aes-256-cbc -v2prf hmacWithSHA256` * `-v2 aes-256-cbc -v2prf hmacWithSHA384` * `-v2 aes-256-cbc -v2prf hmacWithSHA512` -It is highly recommended to use one of the `-v2` variants, because they offer more robust encryption. - [NOTE] ==== Versions before Neo4j 5.0 allow keys to be stored with the old PKCS #1 standard.