Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

libssl: support for ed25519 server certificates #821

Open
MelznerDSA opened this issue Mar 8, 2023 · 6 comments
Open

libssl: support for ed25519 server certificates #821

MelznerDSA opened this issue Mar 8, 2023 · 6 comments

Comments

@MelznerDSA
Copy link

As written in the release notes of version 3.7.0, the support of Ed25519 was added.

However I tried out the command line tool s_client of that version and I don't see in Wireshark that the client offers that algorithm.
Do I need to use some special parameter for the client to activate that?

@botovq
Copy link
Contributor

botovq commented Mar 8, 2023 via email

@MelznerDSA
Copy link
Author

Ok, thanks

@DSAMeiners
Copy link

Is there a way to speed this port up?
We tryied a workaround but it didn't solve the issue.
Is there a release dated scheduled?

@botovq
Copy link
Contributor

botovq commented Mar 17, 2023 via email

@4a6f656c
Copy link
Contributor

We tryied a workaround but it didn't solve the issue.

What exactly are you trying to workaround?

@MelznerDSA
Copy link
Author

A customer had a server certificate with ED25519. I disabled the server certificate check itself in the client (tls_config_insecure_noverifycert) as a workaround to get at least a connection, but the handshake still failed. Probably because of the ephemeral key.

@joshuasing joshuasing changed the title Use of signature algorithm ED25519 with the openssl command line tool libssl: support for ed25519 server certificates Mar 27, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants