Paul Spooren <m...@aparcar.org> wrote:
    > I recently rewrote px5g[1] to use WolfSSL instead of MbedTLS, as the 
former
    > will be included in OpenWrt 20.x per default.

    > Both implementations support the generation of RSA and ECC keys, where 
uhttpd
    > currently defaults to RSA with 2048 keys.

    > The question came up if we really want RSA certificates for LuCI or if the
    > faster and "more modern" ECC P-256 wouldn't be a better choice.

Yes, it would be better.

    > If px5g is added to the next release, certificates are generated on first
    > boot and most users are unlikely to manually recreate RSA ones, not?

But, this will result in a security warning for a self-signed key, and then
we'd be training users to click through them.
I am divided on whether this is better or worse than unencrypted.
browsers are making doing that security exception more and more difficult,
with the desire to eliminating it entirely.

I have running code that deploys LetsEncrypt certificates to devices in the
"factory".   This requires a DNS name for dns-01 challenge.
That's clearly not feasible for random end-users who flash openwrt on their own.
I would like to explore some additional options here.

    > So the question, shouldn't we drop all crypto options from the new px5g
    > implementation and _only_ offer P-256? Whoever wants something else than 
the
    > default may use px5g-mbedtls or some OpenSSL based tool?

uhm, okay.  I can live with that for sure.
I care more about what's in the certificate than the algorithm.

--
]               Never tell me the odds!                 | ipv6 mesh networks [
]   Michael Richardson, Sandelman Software Works        |    IoT architect   [
]     m...@sandelman.ca  http://www.sandelman.ca/        |   ruby on rails    [

Attachment: signature.asc
Description: PGP signature

_______________________________________________
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel

Reply via email to