具有 384 位 Ecc 证书和 openssl 的 nginx 但曲线 secp256r1 不可用

Hen*_* N. 5 ssl nginx openssl

我在 Debian 8 上使用nginx 1.11.7withOpenssl 1.1.0c并且有一个带有 384 位密钥的自签名 ecc 证书用于测试目的。

我想使用曲线 X25519、secp384r1 和 secp256r1。

Nginx 正常启动,在 nginx 配置中启用 X25519 和 secp384r1:

ssl_ecdh_curve X25519:secp384r1;,

但在使用 secp256r1 时拒绝重新启动/重新加载:

ssl_ecdh_curve secp256r1;

错误信息:SSL_CTX_set1_curves_list("secp256r1") failed (SSL:)

那么我如何能够在上述设置中使用 secp256r1 曲线?

Hen*_* N. 4

结果 P-256 已从列表中删除。

\n\n

看:

\n\n
Why Is TLS 1.3 an advancement over TLS 1.2 or 1.1?\nTLS 1.3 removes support for known insecure ciphers such as RC4, DES, 3DES and export grade ciphers as well older hashing algorithms e.g. SHA-1 and MD5. These are welcome changes that should help to reduce the possibility of further vulnerabilities such as SWEET32 and FREAK being present within the code of TLS libraries e.g. OpenSSL.\n\nThis reduces the attack surface (defined within the second paragraph of this blog post) of TLS 1.3 but the improvements don\xe2\x80\x99t stop there. Cipher suites such as NIST P-256 and AES-GCM are being removed as primitives with only x25519, ChaCha20 and Poly1305 remaining developed by Dan Bernstein (who uses the handle djb).\n
Run Code Online (Sandbox Code Playgroud)\n\n

从这里:securityinaction.wordpress.com

\n