Skip to content

ssl: add ability to configure ECDH curves.#766

Merged
mattklein123 merged 1 commit intoenvoyproxy:masterfrom
PiotrSikora:ecdh_curves
Apr 15, 2017
Merged

ssl: add ability to configure ECDH curves.#766
mattklein123 merged 1 commit intoenvoyproxy:masterfrom
PiotrSikora:ecdh_curves

Conversation

@PiotrSikora
Copy link
Copy Markdown
Contributor

While there, change default from "P-256" to "X25519:P-256".

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@mattklein123 I'm not sure what are you thoughts about changing the default. Do you prefer if I leave it as-is (i.e. P-256 only)? Should I split it into another PR?

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@PiotrSikora I don't really have an opinion. TBH I'm not qualified to review TLS changes like this. Can you find one (optimally 2) Google people to review? I can review for code style, etc. but that's about it.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@mattklein123 my question was mostly to check if changing the default curve was acceptable. Those values are sane (Google's public facing infrastructure is using those curves as well).

@davidben would you mind commenting on the curves and/or looking at this PR? Thanks!

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes assuming at least 2 people who know what they are talking about give it a +1 I'm fine changing the defaults.

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Curve selection LGTM. Yeah, X25519 is generally the preferred curve, but P-256 is still needed to talk to all the older clients out there.

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Q: From schema perspective, should we verify non-empty? Or do we want to allow empty string to mean no ECDH? What makes sense?

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Empty string means that SSL_CTX_set1_curves_list won't be called and that BoringSSL is going to use its default curves (currently: X25519:P-256:P-384).

Having said that, setting cipher_suites and/or ecdh_curves to an empty value probably shouldn't be allowed, since the result is most likely not what user intended to do.

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍 let's make the schema non-empty if set then.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done.

While there, change default from "P-256" to "X25519:P-256".

Signed-off-by: Piotr Sikora <piotrsikora@google.com>
@mattklein123 mattklein123 merged commit 106dd3d into envoyproxy:master Apr 15, 2017
jpsim pushed a commit that referenced this pull request Nov 28, 2022
Description: messed up gpg keys for heroku on github actions hosted machines. I opened heroku/cli#1464 with heroku to start a discussion. For now I found in https://cli-assets.heroku.com/install-ubuntu.sh where they host their key.

Signed-off-by: Jose Nino <jnino@lyft.com>
Signed-off-by: JP Simard <jp@jpsim.com>
jpsim pushed a commit that referenced this pull request Nov 29, 2022
Description: messed up gpg keys for heroku on github actions hosted machines. I opened heroku/cli#1464 with heroku to start a discussion. For now I found in https://cli-assets.heroku.com/install-ubuntu.sh where they host their key.

Signed-off-by: Jose Nino <jnino@lyft.com>
Signed-off-by: JP Simard <jp@jpsim.com>
mathetake added a commit that referenced this pull request Mar 3, 2026
**Commit Message**

This cleans up the PR template so that it explicitly says how the title
as well as the description is used in the finale commit.

---------

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>
mathetake added a commit that referenced this pull request Mar 3, 2026
**Description**

This is a follow up on #766 which also required the change in
pr_style_check.yaml.

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>
mathetake added a commit that referenced this pull request Mar 3, 2026
**Description**

This fixes pr_style_check.yaml which has a remaining old portion from
#766.

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants