On Mon, Dec 16, 2019 at 07:15:15PM +0100, Fabio Scotoni wrote: > This diff changes the documentation of openssl(1) enc to note the > default value (sha256) and replace the "hardcoded" list of md5, sha1 > with instructions to use list-message-digest-algorithms instead.
The diff modifies the CA section, not ENC. I need to check if we can do something about the weak defaults there, but the diff is not correct. For ENC, it's indeed correct that the default was changed from md5 to sha256, and this should be updated. However, I'm not sure that we should add a list-message-digest-algorithms reference. I'd just note that the default is sha256 and be done with it. > Inspired by a conversation on misc@ a few weeks ago ("LibreSSL vs. > OpenSSL enc command"). > Perhaps it's also worthwhile to have a HISTORY section/subsection or > historical note about this since it's probably of interoperability > concern for older files. Yes, the question of how to decrypt files that were encrypted with md5 as a digest comes up from time to time on the lists. Not convinced that a HISTORY section would help that. The appropriate place would have been an upgrade note, but the opportunity was missed... > > Index: usr.bin/openssl/openssl.1 > =================================================================== > RCS file: /cvs/src/usr.bin/openssl/openssl.1,v > retrieving revision 1.116 > diff -u -p -r1.116 openssl.1 > --- usr.bin/openssl/openssl.1 28 Nov 2019 11:21:33 -0000 1.116 > +++ usr.bin/openssl/openssl.1 16 Dec 2019 18:09:54 -0000 > @@ -416,10 +416,10 @@ The default is > .Cm pem . > .It Fl md Ar alg > The message digest to use. > -Possible values include > -.Ar md5 > -and > -.Ar sha1 . > +A list of possible values can be obtained with the pseudo-command > +.Cm list-message-digest-algorithms . > +The default value is > +.Ar sha256 . > This option also applies to CRLs. > .It Fl msie_hack > This is a legacy option to make >