ecc negotiation

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




On 05/04/15 23:42, Matt Caswell wrote:
> 
> 
> On 05/04/15 22:04, David Rufino wrote:
>> Hello, 
>>
>> It's possible I'm doing something wrong here, but I can't seem to
>> negotiate ecdhe with an elliptic curve other than P-256. To reproduce
>> the issue, using openssl 1.0.2 
>>
>> openssl s_server  -key server.key -cert server.crt -msg -debug -dhparam
>> dhparam.pem  -cipher ECDHE-RSA-AES128-SHA -tls1_2 
>>
>> gnutls-cli 127.0.0.1 -p 4433 -d 4 --insecure
>> --priority="NORMAL:-KX-ALL:+ECDHE-RSA:-CURVE-ALL:+CURVE-SECP224R1" 
>>
>> which gives the error 
>>
>> :SSL routines:ssl3_get_client_hello:no shared cipher:s3_srvr.c:1366: 
>>
>> changing to p256r1 succeeds. is there a particular why the negotation
>> would fail with p224 ? my understanding is that openssl supports all the
>> nist curves. 
> 
> 
> Try adding "-named_curve secp224r1" to your s_server arguments. This
> specifies the curve to use for ECDHE keys. The default if you don't
> specify a named curve is P-256 which is why it works when you are using
> that curve.

BTW, you can also use "-named_curve auto", which will just pick an
appropriate curve.

Matt



[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux