Am 06.04.2015 um 03:25 schrieb Leif Hedstrom:
On Apr 5, 2015, at 11:54 AM, Reindl Harald <[email protected]> wrote:Am 01.04.2015 um 19:45 schrieb David Boreham:There are concerns that the parameter size should now be larger than was historically typical (2048-bit vs 1024-bit). However, there is no mechanism in the protocol to negotiate the DHE parameter size. Furthermore there are clients fairly commonly encountered (e.g. Java JSSE older than very recent releases) that do not accept a 2048-bit DHE parameter from a server, and do not act gracefully as a result. For these reasons it seems that DHE is normally best disabled on the serverwrong justification, that affects Java6 which don't support SNI and hence is anyways out of the game when it comes to ATS, all other known clients supporting DHE while not ECDHE are happy with a 2048 primeBesides the other stuff, what does not having SNI in Java6 and ATS have to do with each other? ATS most certainly supports setup which do not require SNI. You can configure certificates based on the server IP in the configuration.
interesting but not expected from a enduser like me but to be honest the whole issue and discussions would not exist if ATS would handle a certfile identical to httpd because with a PEM file strcutucre below it would contain the whole chain as well as ECDHE and DHE params
if it then would read the certificates as root before drop privileges (like httpd) you could even re-use the same wildcard-certificates without make a copy with wide open permissions
that would make "dhparams_file" obsolete or at least optional for DHE usage while not present as now could disable them completly
-----BEGIN CERTIFICATE----- certificate -----END CERTIFICATE----- -----BEGIN PRIVATE KEY----- key -----END PRIVATE KEY----- -----BEGIN CERTIFICATE----- intermediate CA -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- intermediate CA -----END CERTIFICATE----- -----BEGIN EC PARAMETERS----- BggqhkjOPQMBBw== -----END EC PARAMETERS----- -----BEGIN DH PARAMETERS----- MIIBCAKCAQEAsac1gnF4WOUXc54XNc/JiEdgPzF9vYroubsPTx3eFQoyW1MUUXmj b65ATEwn4iMkQvee7GEiuWsr1kM5FUeoggYs7LV9asKjvhvMuvNkonmPh4zxvuNR m8dV7wy9N+UnIR02vxKwWNCGroQAu1Glj+kI1dfTMcJbBy9RLVnfGIx/2wnBkZ+W Rk5+RrMZfl9JKWq1k2yaZ1TM2arGQ0vQCOZwi8szYwAgBwOYTl0qZbr02qqFww89 Yn0CfMOpjzRsrw3Md+miJWPxhPUcGQKcJ6aW979lYHqX8YY46M2wardjqZhpJric l52c11s3i39YM75txNrQeW4gXtlMfV6NgwIBAg== -----END DH PARAMETERS-----
signature.asc
Description: OpenPGP digital signature
