(reply to tech, not misc, as there's a diff involved)

On Sun, Oct 14, 2012 at 09:54:22AM -0700, Claus Assmann wrote:
> I just pointed someone to the starttls man page and noticed
> some things that are wrong or don't make much sense:
> 
> The first entry is missing a tag. I don't understand:
> "force string verification depths to at least 80 bits"
> "string" -> "strong" maybe?
> But "depths to at least 80 bits" doesn't make much sense to me.
> 
> cf/README states:
> VERIFY:bits   verification must have succeeded and ${cipher_bits} must
>               be greater than or equal bits.
> ENCR:bits     ${cipher_bits} must be greater than or equal bits.
> 
> So here's a suggested patch (also increasing the strength, as 112/80
> isn't considered "strong").
> 

after some discussion with claus, we tweaked this a little further
from the original diff. i'll commit this if no one objects, but explicit
oks very welcome.

jmc

Index: starttls.8
===================================================================
RCS file: /cvs/src/share/man/man8/starttls.8,v
retrieving revision 1.18
diff -u -r1.18 starttls.8
--- starttls.8  26 Sep 2012 17:34:38 -0000      1.18
+++ starttls.8  16 Oct 2012 16:13:19 -0000
@@ -319,13 +319,14 @@
 Here are a few example entries that illustrate these features, and
 the role based granularity as well:
 .Pp
-Force strong (112-bit) encryption for communications for this server:
+Require strong (256-bit) encryption for communication with this server:
 .Pp
-.Dl server1.example.net        ENCR:112
+.Dl TLS_Srv:server1.example.net        ENCR:256
 .Pp
-For a TLS client, force string verification depths to at least 80 bits:
+For a TLS client,
+require verification and a minimum of 128-bit encryption:
 .Pp
-.Dl TLS_Clt:desktop.example.net VERIFY:80
+.Dl TLS_Clt:desktop.example.net VERIFY:128
 .Pp
 Much more complicated access maps are possible, and error conditions (such
 as permanent or temporary, PERM+ or TEMP+) can be set on the basis of

Reply via email to