Commit 49cf2cd8 authored by Bruce Momjian's avatar Bruce Momjian

doc: improve ssl_ecdh_curve descriptions

Patch by Marko Kreen
parent b8cc8f94
......@@ -1020,13 +1020,23 @@ include 'filename'
</term>
<listitem>
<para>
Specifies the name of the curve to use in ECDH key exchanges. The
default is <literal>prime256p1</>.
Specifies the name of the curve to use in ECDH key exchange.
It needs to be supported by all clients that connect.
It does not need to be same curve as used by server's
Elliptic Curve key. The default is <literal>prime256v1</>.
</para>
<para>
The list of available curves can be shown with the command
<literal>openssl ecparam -list_curves</literal>.
OpenSSL names for most common curves:
<literal>prime256v1</> (NIST P-256),
<literal>secp384r1</> (NIST P-384),
<literal>secp521r1</> (NIST P-521).
</para>
<para>
The full list of available curves can be shown with the command
<literal>openssl ecparam -list_curves</literal>. Not all of them
are usable in TLS though.
</para>
</listitem>
</varlistentry>
......
......@@ -616,17 +616,18 @@
</para>
<para>
Such keys are faster and have improved security over previous
options. The new configuration
parameter <link linkend="guc-ssl-ecdh-curve"><varname>ssl_ecdh_curve</></link>
controls which curve is used.
This allows use of Elliptic Curve keys for server authentication.
Such keys are faster and have improved security over <acronym>RSA</> keys.
The new configuration parameter
<link linkend="guc-ssl-ecdh-curve"><varname>ssl_ecdh_curve</></link>
controls which curve is used for <acronym>ECDH</>.
</para>
</listitem>
<listitem>
<para>
Improve the default <link
linkend="guc-ssl-ciphers"><varname>ssl_ciphers</></link> ciphers
linkend="guc-ssl-ciphers"><varname>ssl_ciphers</></link> value
(Marko Kreen)
</para>
</listitem>
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment