-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adjust cipher and signature algorithm preference list for hardware #218
Comments
From https://www.w3.org/2019/09/15-webscreens-minutes.html#x06:
|
For ciphers, there is basically nothing to do here. The required ciphers for TLS 1.3 cover both newer and older hardware:
https://www.rfc-editor.org/rfc/rfc8446.html#page-102 For key signing and signature verification in TLS, there are some tradeoffs between the mandatory to implement algorithms (which include Since we are already requiring ECDSA for the agent certificate, it would make sense to just say the certificate's signing algorithm must be |
Point of reference: Comparison of TLS implementations |
This will be addressed when PR #297 lands. |
We added a list of recommended ciphers and signature algorithms for TLS 1.3 from PR #206. But we should find a benchmark referencing the hardware requirements to prioritize the list and determine the mandatory ciphers/algorithms.
The text was updated successfully, but these errors were encountered: