Skip to content

Conversation

@mark-kubacki
Copy link

No description provided.

Signing and verifying is way faster with the optimized P-256 curve,
and the ECDSA scheme.
@mark-kubacki
Copy link
Author

Ideally you'd then:

  1. Use the x25519 curve only (and skip the NIST Pxxx ones).
  2. Expire the current TLS ticket secret (server-side) after so many hours to actually implement PFS.

With (1) you could run into compatibility issues because some old TLS stacks don't support x25519.
(2) would make your example a tiny bit more complex, but I could implement this in a separate PR in like 70 lines.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant