[openssl-dev] [openssl.org #4677] Options after parameters are ignored in OpenSSL 1.1.0

2016-09-17 Thread Richard Levitte via RT
On Sat Sep 17 17:54:11 2016, pe...@lekensteyn.nl wrote: > Hi, > > Commands which execute normally with OpenSSL 1.0.2h fail in OpenSSL > 1.1.0. Presumably after the "Big apps cleanup (option-parsing, etc)", > > Options after parameters are no longer interpreted. For example, > 'openssl dhparam 128

Re: [openssl-dev] X25519 is the default curve for ECDHE in OpenSSL 1.1.0

2016-09-17 Thread Salz, Rich
> When we added X25519 to BoringSSL, we at the same time started made the > server require clients supply a curve list (and otherwise we'd just pick a > non-ECDHE cipher), because of this issue. That went in back in December 2015 > and it's been running just fine. I'd recommend OpenSSL do the

Re: [openssl-dev] X25519 is the default curve for ECDHE in OpenSSL 1.1.0

2016-09-17 Thread Viktor Dukhovni
On Sat, Sep 17, 2016 at 02:35:20PM +, Salz, Rich wrote: > > When we added X25519 to BoringSSL, we at the same time started made the > > server require clients supply a curve list (and otherwise we'd just pick > > a non-ECDHE cipher), because of this issue. That went in back in December > >

[openssl-dev] [openssl.org #4677] Options after parameters are ignored in OpenSSL 1.1.0

2016-09-17 Thread Peter Wu via RT
Hi, Commands which execute normally with OpenSSL 1.0.2h fail in OpenSSL 1.1.0. Presumably after the "Big apps cleanup (option-parsing, etc)", Options after parameters are no longer interpreted. For example, 'openssl dhparam 128 -out /dev/null' used to discard the DH params output, but since

Re: [openssl-dev] X25519 is the default curve for ECDHE in OpenSSL 1.1.0

2016-09-17 Thread Viktor Dukhovni
On Sat, Sep 17, 2016 at 03:46:53PM +, Salz, Rich wrote: > > If a client offers ECDHE ciphers with no curve list, one might > > alternatively just > > use P-256. It is likely better than the other choices. Most clients will > > send a > > curve list. > > Most will, and I'd rather get

Re: [openssl-dev] X25519 is the default curve for ECDHE in OpenSSL 1.1.0

2016-09-17 Thread David Benjamin
On Sat, Sep 17, 2016 at 12:06 PM Viktor Dukhovni wrote: > On Sat, Sep 17, 2016 at 03:46:53PM +, Salz, Rich wrote: > > > > If a client offers ECDHE ciphers with no curve list, one might > alternatively just > > > use P-256. It is likely better than the other

Re: [openssl-dev] X25519 is the default curve for ECDHE in OpenSSL 1.1.0

2016-09-17 Thread Salz, Rich
> > In other words: only use ECDHE if client specifies a curve list. WFM. > > If a client offers ECDHE ciphers with no curve list, one might alternatively > just > use P-256. It is likely better than the other choices. Most clients will > send a > curve list. Most will, and I'd rather get