summaryrefslogtreecommitdiff
path: root/changes
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2012-12-25 20:04:54 -0500
committerNick Mathewson <nickm@torproject.org>2012-12-25 20:22:46 -0500
commit25afecdbf999eb91ed9216be1f8b8cdf0f78135b (patch)
tree73665d46e5858deac1c95c2473166c8c67e98dc7 /changes
parentc8b3bdb78215d4d7821d9bfa15bb8f7786403ce9 (diff)
downloadtor-25afecdbf999eb91ed9216be1f8b8cdf0f78135b.tar.gz
tor-25afecdbf999eb91ed9216be1f8b8cdf0f78135b.zip
Make ECDHE group configurable: 224 for public, 256 for bridges (default)
Diffstat (limited to 'changes')
-rw-r--r--changes/tls_ecdhe12
1 files changed, 7 insertions, 5 deletions
diff --git a/changes/tls_ecdhe b/changes/tls_ecdhe
index 58a8f90692..48c6384dad 100644
--- a/changes/tls_ecdhe
+++ b/changes/tls_ecdhe
@@ -1,10 +1,12 @@
o Major features:
- - Servers can now enable the ECDHE TLS ciphersuites when
- available and appropriate. These ciphersuites, when used with
- the P-256 elliptic curve, let us negotiate forward-secure TLS
- secret keys more safely and more efficiently than with our
- previous use of Diffie Hellman modulo a 1024-bit prime.
+ - Servers can now enable the ECDHE TLS ciphersuites when available
+ and appropriate. These ciphersuites let us negotiate forward-
+ secure TLS secret keys more safely and more efficiently than with
+ our previous use of Diffie Hellman modulo a 1024-bit prime.
+ By default, public servers prefer the (faster) P224 group, and
+ bridges prefer the (more common) P256 group; you can override this
+ with the TLSECGroup option.
Enabling these ciphers was a little tricky, since for a long
time, clients had been claiming to support them without