Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Disable elliptical curves #48

Closed
rugk opened this issue Nov 9, 2015 · 5 comments
Closed

Disable elliptical curves #48

rugk opened this issue Nov 9, 2015 · 5 comments

Comments

@rugk
Copy link

rugk commented Nov 9, 2015

Based on #45 it would of course also be very nice to be able to disable specific elliptical curves like you can currently do with ciphers.

@sibiantony
Copy link
Owner

Do you mean an ECC certificate ? Unfortunately, no. What you're asking is to identify the server-side certificate, even before an SSL handshake and block it? We probably need a new protocol standard for that. 😉 And/or some support from browser to let an add-on do that.

This is unlike disabling cipher-suites - where the server side (and clients) support many cipher-suites and if you disable a few cipher-suites you could still connect to a server with another common suite. Cipher suites used are profile preferences that can be toggled. Whereas, the curve details are only available from the certificate offered from the server.

As an add-on what could be done is to expose the curve details (which is otherwise tracked as a separate issue). Closing this issue.

@rugk
Copy link
Author

rugk commented Nov 12, 2015

No I did not meant an ECC certificate (ECDSA) - obviously you cannot block this.
I meant ECDHE connections and the curve used there. This has nothing to do with the cipher as it is the same cipher (TLS_ECDHE_RAS_...) is used - just the curves used for the connection may be disabled.

Still I'm not sure whether this is possible, because the curves may be hard-compiled into Firefox/NSS, but well... it is an idea.

@sibiantony
Copy link
Owner

Okay. Again, Firefox doesn't expose those details. The curve used is buried in the SSL handshake ServerKeyExchange.
And yes, would have been nice if it was available through an interface.

@rugk
Copy link
Author

rugk commented Nov 12, 2015

This issue is about changing the curves...
So does this also affect #45? In other words: Can you still display the curves?

@sibiantony
Copy link
Owner

The curve details from an ECC certificate (Public key algorithm parameters) is available. You can find it in Certificate -> Subject Public Key Algorithm -> Public key parameters. This can be displayed.

However, for a key exchange the curve used is always negotiated during the SSL handshake. (Client Hello -> ServerKeyExchange). So, no, the key exchange curve cannot be displayed.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants