]> Cypherpunks repositories - gostls13.git/commit
crypto/tls: recommend P256 elliptic curve
authorKevin Burke <kev@inburke.com>
Mon, 10 Apr 2017 17:22:26 +0000 (10:22 -0700)
committerBrad Fitzpatrick <bradfitz@golang.org>
Mon, 10 Apr 2017 17:40:01 +0000 (17:40 +0000)
commit26c2926f648cafdbd09954495242a67eedb631b4
tree0feae2e97f45b6d11511e739223c6e8040846294
parent52b33965fdc91c88f6df3cb60ecb0b7289d3004f
crypto/tls: recommend P256 elliptic curve

Users (like myself) may be tempted to think the higher-numbered curve
is somehow better or more secure, but P256 is currently the best
ECDSA implementation, due to its better support in TLS clients, and a
constant time implementation.

For example, sites that present a certificate signed with P521
currently fail to load in Chrome stable, and the error on the Go side
says simply "remote error: tls: illegal parameter".

Fixes #19901.

Change-Id: Ia5e689e7027ec423624627420e33029c56f0bd82
Reviewed-on: https://go-review.googlesource.com/40211
Reviewed-by: Brad Fitzpatrick <bradfitz@golang.org>
src/crypto/tls/generate_cert.go