> When we added X25519 to BoringSSL, we at the same time started made the > server require clients supply a curve list (and otherwise we'd just pick a > non-ECDHE cipher), because of this issue. That went in back in December 2015 > and it's been running just fine. I'd recommend OpenSSL do the same.
In other words: only use ECDHE if client specifies a curve list. WFM. -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev