diff options
author | Nick Mathewson <nickm@torproject.org> | 2012-12-25 20:04:54 -0500 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2012-12-25 20:22:46 -0500 |
commit | 25afecdbf999eb91ed9216be1f8b8cdf0f78135b (patch) | |
tree | 73665d46e5858deac1c95c2473166c8c67e98dc7 /changes | |
parent | c8b3bdb78215d4d7821d9bfa15bb8f7786403ce9 (diff) | |
download | tor-25afecdbf999eb91ed9216be1f8b8cdf0f78135b.tar.gz tor-25afecdbf999eb91ed9216be1f8b8cdf0f78135b.zip |
Make ECDHE group configurable: 224 for public, 256 for bridges (default)
Diffstat (limited to 'changes')
-rw-r--r-- | changes/tls_ecdhe | 12 |
1 files changed, 7 insertions, 5 deletions
diff --git a/changes/tls_ecdhe b/changes/tls_ecdhe index 58a8f90692..48c6384dad 100644 --- a/changes/tls_ecdhe +++ b/changes/tls_ecdhe @@ -1,10 +1,12 @@ o Major features: - - Servers can now enable the ECDHE TLS ciphersuites when - available and appropriate. These ciphersuites, when used with - the P-256 elliptic curve, let us negotiate forward-secure TLS - secret keys more safely and more efficiently than with our - previous use of Diffie Hellman modulo a 1024-bit prime. + - Servers can now enable the ECDHE TLS ciphersuites when available + and appropriate. These ciphersuites let us negotiate forward- + secure TLS secret keys more safely and more efficiently than with + our previous use of Diffie Hellman modulo a 1024-bit prime. + By default, public servers prefer the (faster) P224 group, and + bridges prefer the (more common) P256 group; you can override this + with the TLSECGroup option. Enabling these ciphers was a little tricky, since for a long time, clients had been claiming to support them without |