-
-
Notifications
You must be signed in to change notification settings - Fork 10.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Default ecdh curve order #9748
Comments
The p256 implementation has an assembler version that is a
factor of 10 faster then the p384 impementation.
|
This is what I get:
|
I guess I should also point at some other reasons why P384 and P521 aren't higher in the priority list. I might be wrong about some things, but it's at least my understanding of the situtation.
I think it makes more sense to switch to X25519 and X448. People that don't have those probably also don't have a good implementation for P384 and P521. |
I see, thank you for the explanation @kroeckx ! it make definitely sense especially in relation to the considerations about the constant time implementations in OpenSSL. |
This question seems to have been answered. Closing. |
While experimenting within the Globaleaks application i've noticed that the default OpenSSL ecdh curve configuration seems to be
x25519, secp256r1, x448, secp521r1, secp384r1
.This, in combination with
SSL_CTX_set_ecdh_auto
seems to cause that clients that support secp521r1, secp384r1 would prefer the less secure secp256r1.I wonder which are the reasons for this default configuration and if it could be worth it to change it.
Thank you,
p.s.: my tests have been performed on Ubuntu 18.04 with openssl 1.1.1.
The text was updated successfully, but these errors were encountered: