-
Notifications
You must be signed in to change notification settings - Fork 7.3k
Conversation
if (!bio) | ||
return; | ||
|
||
DH *dh = PEM_read_bio_DHparams(bio, NULL, NULL, NULL); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
DH* dh
@shigeki what's wrong with EDH ciphers? Other than a few nits - LGTM. |
@indutny Thanks for reviewing. It seems that |
And why do we need to disable them? |
I'm not sure the reason of the old commit. But it might come from prohibiting CBC by BEAST. |
Yeah, I already have a good cipher list for a v0.12. Let's remove |
4dcb018
to
ba2affe
Compare
`!EDH` is also removed from the list in the discussion of nodejs#8272
@indutny The patch is revised with your comments. Also two changes are
Please review this again. |
In case of an invalid DH parameter file, it is sliently discarded. To use auto DH parameter in a server and DHE key length check in a client, we need to wait for the next release of OpenSSL-1.0.2.
`!EDH` is also removed from the list in the discussion of nodejs#8272
ba2affe
to
db29afb
Compare
LGTM, thank you! |
`!EDH` is also removed from the list in the discussion of #8272 Reviewed-By: Fedor Indutny <[email protected]>
Per #8264, please review this, @indutny .
This also changes the default cipher list as
DHE-RSA-AES128-SHA256
is added and!EDH
is explicitly written to!EDH-RSA-DES:!EDH-DSS-DES
.In case of an invalid DH parameter file, it is sliently discarded.
To use auto DH parameter in a server and DHE key length check in a client, we need to wait for the next release of OpenSSL-1.0.2.