Annotate

TODO @ 10721:3a1b1d3084fb 0.11

core.certmanager: Move EECDH ciphers before EDH in default cipherstring (fixes #1513) Backport of 94e341dee51c The original intent of having kEDH before kEECDH was that if a `dhparam` file was specified, this would be interpreted as a preference by the admin for old and well-tested Diffie-Hellman key agreement over newer elliptic curve ones. Otherwise the faster elliptic curve ciphersuites would be preferred. This didn't really work as intended since this affects the ClientHello on outgoing s2s connections, leading to some servers using poorly configured kEDH. With Debian shipping OpenSSL settings that enforce a higher security level, this caused interoperability problems with servers that use DH params smaller than 2048 bits. E.g. jabber.org at the time of this writing has 1024 bit DH params. MattJ says > Curves have won, and OpenSSL is less weird about them now
author Kim Alvefur <zash@zash.se>
date Sun, 25 Aug 2019 20:22:35 +0200
parent 5405:4f98f2f60e22
child 9803:35ef6af41600
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
rev   line source
5405
4f98f2f60e22 TODO: Remove 0.9
Matthew Wild <mwild1@gmail.com>
parents: 4938
diff changeset
1 == 1.0 ==
4138
62f5e6b11571 TODO: Update for 0.9 milestones
Matthew Wild <mwild1@gmail.com>
parents: 4134
diff changeset
2 - Roster providers
4938
76a960bff4c7 TODO: Add statistics
Matthew Wild <mwild1@gmail.com>
parents: 4138
diff changeset
3 - Statistics
4138
62f5e6b11571 TODO: Update for 0.9 milestones
Matthew Wild <mwild1@gmail.com>
parents: 4134
diff changeset
4 - Clustering
2663
b3d1c4985182 TODO: Update
Matthew Wild <mwild1@gmail.com>
parents: 1520
diff changeset
5 - World domination