Currently we only have 1024bit DH params enabled, which is a "bit" weak, so while we also offer ECDHE key exchange and would like to drop DHE cipher suite we really can't do that at the moment, because some clients do not support ECDHE key exchange.
So, in short: Let's provide reasonable secure DH params.
And let's do it by patching them into OpenSSL directly so we can take advantage of that on every server component that's using OpenSSL... at least if that's possible to easily patch it in :-)
Currently we only have 1024bit DH params enabled, which is a "bit" weak, so while we also offer
ECDHE
key exchange and would like to dropDHE
cipher suite we really can't do that at the moment, because some clients do not supportECDHE
key exchange.So, in short: Let's provide reasonable secure DH params.
And let's do it by patching them into OpenSSL directly so we can take advantage of that on every server component that's using OpenSSL... at least if that's possible to easily patch it in :-)