Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

config: Use the P-256 curve by default for RPC. #2459

Merged

Conversation

davecgh
Copy link
Member

@davecgh davecgh commented Nov 4, 2020

This modifies the default curve used to generate the RPC certificates to be P-256 instead of P-521. While I very much prefer the stronger curve, unfortunately, Chromium removed support for P-521 and since that is what electron uses under the hood, Decrediton can no longer connect to dcrd RPC servers using a certificate with P-521.

@davecgh davecgh added this to the 1.6.0 milestone Nov 4, 2020
Copy link
Member

@jrick jrick left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

One other advantage of the P-256 curve is that it has a constant time implementation, while P-521 does not.

This modifies the default curve used to generate the RPC certificates to
be P-256 instead of P-521.  While I very much prefer the stronger curve,
unfortunately, Chromium removed support for P-521 and since that is what
electron uses under the hood, Decrediton can no longer connect to dcrd
RPC servers using a certificate with P-521.
@davecgh davecgh force-pushed the config_change_default_rpc_cert_curve branch from 88a1cdf to dfafa02 Compare November 4, 2020 18:23
@davecgh davecgh merged commit dfafa02 into decred:master Nov 4, 2020
@davecgh davecgh deleted the config_change_default_rpc_cert_curve branch November 4, 2020 18:26
@davecgh davecgh modified the milestones: 1.6.0, 1.7.0 Nov 4, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants