Closed mro closed 3 years ago
I believe it is not supported by ‘ocaml-tls’. You can see here the supported protocols: https://github.com/mirleft/ocaml-tls/blob/master/lib/ciphersuite.ml
May be worth trying using ssl. With the current version of cohttp/conduit (pre 3.0.0) you can use the env variable CONDUIT_TLS to specify what to use: CONDUIT_TLS=native will use the tls library and CONDUIT_TLS=openssl will use the ssl library
ok, i see. Sadly I came here in order to avoid openssl installation issues. https://github.com/ocaml/opam-repository/issues/16330 So that doesn't no help here.
@mseri can you hint me, which curve to pick in the server settings? The ciphersuite page above doesn't mention the word 'curve', so I'm clueless.
Let me ping @hannesm that know tls way better than me
what ocaml-tls implements is (similar to what is required by TLS 1.3):
So, if you use either P256 (instead of P384) or 25519, that should work fine. The P384 could as well be interfaced and implemented via fiat if strongly desired.
I poked around configuring the server with values from $ openssl ecparam -list_curves
without success.
Finally commented it out, still got an A+ at https://www.ssllabs.com/ssltest/analyze.html?d=paste.mro.name and working 🐫 handshake! 🎉
@hannesm @mseri thanks!
when following the server config recommendation https://bettercrypto.org/#_lighttpd
the handshake breaks:
Removing the server config option works:
Installed versions:
Should I go with another curve (which one?) or will ocaml-tls implement
secp384r1
?Maybe related to #571