Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on.
When configuring or programming SSL/TLS servers, at some point a SSL/TLS cipher suite and a list of supported protocols have to be chosen. Unfortunately, not all configuration options are safe. :(
- Mark insecure SSL ciphers as errors
- Mark insecure SSL protocols as errors
- Works with all configuration files (web servers, mail servers, …)
- Works with all source code (independently on the used programming language)
- Works on top of regular syntax highlighting
Enough words, see sslsecure.vim in action!
Additional notes on runtime cipher expanding
Cipher suites are expanded upon runtime. This is especially important when using
+CHIPER statements in your suite, as insecure ciphers might be included upon runtime.
Example: The following (suggested by Cipherli.st) cipher suite doesn’t seem to contain any insecure ciphers when specifying:
However, depending on your OpenSSL/ LibreSSL version, this suite expands upon runtime to the following (note the insecure
The plugin currently doesn’t save you from this pitfall. It’s therefore recommended, not to use the
+ statement in your cipher suite.
There’s an issue that discusses whether this plugin should also highlight all
Just plug it into your favorite Vim package manager:
1 2 3 4 5 6 7 8
Using sslsecure.vim and nginx.vim together
sslsecure.vim was inspired by my other plugin
nginx.vim, which also automatically tries to detect insecure settings, but is nginx specific. Both plugins can be used alongside –
nginx.vim automatically detects when
sslsecure.vim is installed, so errors are not highlighted twice.
Edit: Auch ein Danke an Heise für den Artikel über dieses Plugin!