> - FF [claims it does 
> DHE/EDH](https://urldefense.proofpoint.com/v2/url?u=https-3A__wiki.mozilla.org_Security_Server-5FSide-5FTLS-23Intermediate-5Fcompatibility-5F.28default.29&d=DwMGaQ&c=96ZbZZcaMF4w0F4jpN6LZg&r=4LM0GbR0h9Fvx86FtsKI-w&m=XJoX203uiiC98n6L2888TI9zC37FTWeD7taNoV50GDE&s=v0qGxpAFrqvTmiNnI5_Cl-Yd-tKrA-FDw6jO-lERXjY&e=),
>  but it does not actually, in practice.  It does either EC, or RSA.  I've 
> tested it. (v52)  This does not look like an accident.
>
>  Have you find a server that does DHE/EDH, and only that, that FF cannot 
> connect to?

I've set mine to test this comprehensively. (Apache and NginX)  With Apache 
Firefox -ignores- server-prescribed ciphers and chooses an EC.  NginX does 
properly prevail with the algo.  Was this an accident, Apache?

And Firefox simply can not make a connexion when the only choices are the 
DHE/EDH algos -- which they say they can do 
[here](https://wiki.mozilla.org/Security/Server_Side_TLS#Intermediate_compatibility_.28default.29).

> - "Prefer conventional discrete-log-based systems over elliptic-curve 
> systems; the latter have constants that the NSA influences when they can."
>
> I missed that, thanks.  And for non-NSA curves that aren’t influenced?

As with Schnier, I don't trust any EC.  It's a shame.  I am looking forward to 
[independent 
lattice](https://policyreview.info/articles/news/post-snowden-cryptography-and-network-security/390).
 (Not that Mozilla, will implement it)  For now I'm set to DHE/EDH 
(fruitlessly) and RSA (AES).  RSA is cracked by a very few, but this is the 
decision I've made.
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to