tls_ecdhe 1.3 KB

1234567891011121314151617181920212223242526
  1. o Major features:
  2. - Servers can now enable the ECDHE TLS ciphersuites when available
  3. and appropriate. These ciphersuites let us negotiate forward-
  4. secure TLS secret keys more safely and more efficiently than with
  5. our previous use of Diffie Hellman modulo a 1024-bit prime.
  6. By default, public servers prefer the (faster) P224 group, and
  7. bridges prefer the (more common) P256 group; you can override this
  8. with the TLSECGroup option.
  9. Enabling these ciphers was a little tricky, since for a long
  10. time, clients had been claiming to support them without
  11. actually doing so, in order to foil fingerprinting. But with
  12. the client-side implementation of proposal 198 in
  13. 0.2.3.17-beta, clients can now match the ciphers from recent
  14. firefox versions *and* list the ciphers they actually mean, so
  15. servers can believe such clients when they advertise ECDHE
  16. support in their TLS ClientHello messages.
  17. This feature requires clients running 0.2.3.17-beta or later,
  18. and requires both sides to be running OpenSSL 1.0.0 or later
  19. with ECC support. OpenSSL 1.0.1, with the compile-time option
  20. "enable-ec_nistp_64_gcc_128", is highly recommended.
  21. Implements the server side of proposal 198; closes ticket
  22. 7200.