View Issue Details
| ID | Project | Category | View Status | Date Submitted | Last Update |
|---|---|---|---|---|---|
| 0003124 | 10000-007: Profiles | Spec | public | 2015-07-13 06:35 | 2020-06-02 16:24 |
| Reporter | Randy Armstrong | Assigned To | Jim Luth | ||
| Priority | normal | Severity | feature | Reproducibility | always |
| Status | closed | Resolution | won't fix | ||
| Summary | 0003124: Add TLS 1.2 Profile with ECC and PFS | ||||
| Description | Require this algorithm: note needs to be verified before release. | ||||
| Tags | No tags attached. | ||||
| Commit Version | |||||
| Fix Due Date | |||||
|
|
At the moment the AnsiC stack is unable to negotiate forward secrecy. openssl s_client -cipher "EECDH" -connect localhost:443 We should make sure that that is at least possible to use forward secrecy To enable EECDH support I need to select a curve in the server SSL context. diff --git a/platforms/win32/opcua_p_socket_internal.c b/platforms/win32/opcua_p_socket_internal.c
@@ -607,6 +608,14 @@ OpcUa_StatusCode OpcUa_SocketManager_InternalCreateServer(
PS: openssl offers many different choices for the elliptic curve to use, |
|
|
Well, and as it looks for me, we are currently using TLSv1.0 only, That means that we cannot connect to a client that uses TLSv1_1_client_method I think for upward compatibility, it would be much better to use together with something like this of course: This would enable us to negotiate between TLSv1.0, 1.1 and 1.2, and use |
|
|
my comments above were referring to the 334 version of the Ansi C stack. At that time the situation was a bit worse, as it refused to negotiate The current Ansi C stack in the GIT has a slightly different status: It negotiates between TLS 1.2, 1.1 and 1.0. I wanted to disable TLS 1.0 but that will break interoperability with The stack supports EECDH, but that is disabled at the moment due to the And it also supports DHE, but it needs a DH Parameter file to be able to In order to enable DHE, the application must set the A dhparam file can be generated by the following openssl command: openssl dhparam -outform PEM -out "$DHPARAM_FILE_LOCATION" 2048 This takes a while. |
|
|
We already have a profile for PFS. |
|
|
not to fix |
| Date Modified | Username | Field | Change |
|---|---|---|---|
| 2015-07-13 06:35 | Randy Armstrong | New Issue | |
| 2015-07-14 15:28 | Randy Armstrong | Target Version | 1.03 => 1.04 |
| 2015-07-14 15:39 | Jim Luth | Assigned To | => Jim Luth |
| 2015-07-14 15:39 | Jim Luth | Status | new => acknowledged |
| 2015-07-14 15:39 | Jim Luth | Assigned To | Jim Luth => |
| 2015-07-28 12:29 | Bernd Edlinger | Note Added: 0006276 | |
| 2015-07-29 07:22 | Bernd Edlinger | Note Added: 0006290 | |
| 2016-10-25 09:45 | Bernd Edlinger | Note Added: 0007268 | |
| 2016-11-29 16:06 | Karl Deiretsbacher | Note Added: 0007382 | |
| 2016-11-29 16:06 | Karl Deiretsbacher | Target Version | 1.04 => |
| 2017-01-04 12:53 | Karl Deiretsbacher | Target Version | => ?.?? |
| 2020-06-02 16:24 | Jim Luth | Assigned To | => Jim Luth |
| 2020-06-02 16:24 | Jim Luth | Status | acknowledged => closed |
| 2020-06-02 16:24 | Jim Luth | Resolution | open => won't fix |
| 2020-06-02 16:24 | Jim Luth | Note Added: 0012160 |