Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Move ECDHE key init to OpenSSL server context #5494

Merged
merged 1 commit into from Dec 31, 2017

Conversation

jhass
Copy link
Member

@jhass jhass commented Dec 31, 2017

For client sockets it restricts what curves are available,
making some TLS handshakes fail needlessly

I mistakenly enabled this for client sockets in 6e43837

For client sockets it restricts what curves are available,
making some TLS handshakes fail needlessly
@RX14
Copy link
Contributor

RX14 commented Dec 31, 2017

Can we spec this? Possibly by connecting to localhost?

@jhass
Copy link
Member Author

jhass commented Dec 31, 2017

I'm not sure, we would need a server that is configured to break with the previous behavior, which we currently have no real way to do that I'm aware of. In any case we won't make the spec situation worse without (there's zero specs covering any side of this) and writing that stuff would be 20 times the effort of figuring out this issue...

@RX14 RX14 added this to the Next milestone Dec 31, 2017
@RX14 RX14 merged commit 29488b0 into crystal-lang:master Dec 31, 2017
@jhass
Copy link
Member Author

jhass commented Jan 1, 2018

<3 thanks

@RX14
Copy link
Contributor

RX14 commented Jan 1, 2018

@bcardiff do we want to cherry-pick this into the 0.24.2 release?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants