[ https://issues.apache.org/jira/browse/TS-2392?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Jan-Frode Myklebust updated TS-2392: ------------------------------------ Description: ATS does not seem to support the elliptic curve diffie hellman ephemeral key exchanges (ECDH) that are available in openssl. It seems these needs to be enabled explicitly to take advantage of them. Ref: the following commit for how this support was added to apache httpd v2.3.3: http://mail-archives.apache.org/mod_mbox/httpd-cvs/200911.mbox/%3c20091110075514.166a62388...@eris.apache.org%3E and for stud: https://github.com/bumptech/stud/pull/61/files Maybe both a DH key exchange needs to be set up, and then the various elliptic curves needs to be initialized..? Checking the openssl docs, I see SSL_CTX_set_tmp_dh_callback() needs to be called to set up the ephemeral keys: http://www.openssl.org/docs/ssl/SSL_CTX_set_tmp_dh_callback.html https://tech.immerda.ch/2011/11/the-state-of-forward-secrecy-in-openssl/ http://wiki.openssl.org/index.php/Elliptic_Curve_Diffie_Hellman And these are the named curves available with openssl-1.0.1e-16.el6_5.x86_64 on RHEL-6.5: {noformat} $ openssl ecparam -list_curves secp384r1 : NIST/SECG curve over a 384 bit prime field prime256v1: X9.62/SECG curve over a 256 bit prime field {noformat} was: ATS does not seem to support the elliptic curve diffie hellman ephemeral key exchanges (ECDH) that are available in openssl. It seems these needs to be enabled explicitly to take advantage of them. Ref: the following commit for how this support was added to apache httpd v2.3.3: http://mail-archives.apache.org/mod_mbox/httpd-cvs/200911.mbox/%3c20091110075514.166a62388...@eris.apache.org%3E and for stud: https://github.com/bumptech/stud/pull/61/files Maybe both a DH key exchange needs to be set up, and then the various elliptic curves needs to be initialized..? Checking the openssl docs, I see SSL_CTX_set_tmp_dh_callback() needs to be called to set up the ephemeral keys: http://www.openssl.org/docs/ssl/SSL_CTX_set_tmp_dh_callback.html https://tech.immerda.ch/2011/11/the-state-of-forward-secrecy-in-openssl/ > Enable elliptic curve ciphers to support forward secrecy > -------------------------------------------------------- > > Key: TS-2392 > URL: https://issues.apache.org/jira/browse/TS-2392 > Project: Traffic Server > Issue Type: Improvement > Components: SSL > Reporter: Jan-Frode Myklebust > > ATS does not seem to support the elliptic curve diffie hellman ephemeral key > exchanges (ECDH) that are available in openssl. It seems these needs to be > enabled explicitly to take advantage of them. Ref: the following commit for > how this support was added to apache httpd v2.3.3: > http://mail-archives.apache.org/mod_mbox/httpd-cvs/200911.mbox/%3c20091110075514.166a62388...@eris.apache.org%3E > and for stud: > https://github.com/bumptech/stud/pull/61/files > Maybe both a DH key exchange needs to be set up, and then the various > elliptic curves needs to be initialized..? > Checking the openssl docs, I see SSL_CTX_set_tmp_dh_callback() needs to be > called to set up the ephemeral keys: > http://www.openssl.org/docs/ssl/SSL_CTX_set_tmp_dh_callback.html > https://tech.immerda.ch/2011/11/the-state-of-forward-secrecy-in-openssl/ > http://wiki.openssl.org/index.php/Elliptic_Curve_Diffie_Hellman > And these are the named curves available with openssl-1.0.1e-16.el6_5.x86_64 > on RHEL-6.5: > {noformat} > $ openssl ecparam -list_curves > secp384r1 : NIST/SECG curve over a 384 bit prime field > prime256v1: X9.62/SECG curve over a 256 bit prime field > {noformat} -- This message was sent by Atlassian JIRA (v6.1#6144)