1
0
mirror of https://github.com/osmarks/ngircd.git synced 2024-12-12 09:50:29 +00:00

ssl: gnutls: bump dh bitsize to 2048

problem is that some clients refuse to connect to severs that only offer
1024.  For interoperability it would be best to just use 4096, but that
takes minutes, even on current hardware.
This commit is contained in:
Florian Westphal 2011-06-04 22:57:29 +02:00
parent dd7d64f577
commit 49b2d0ec98
2 changed files with 3 additions and 3 deletions

View File

@ -51,7 +51,7 @@ OpenSSL:
Creating a self-signed certificate and key:
$ openssl req -newkey rsa:2048 -x509 -keyout server-key.pem -out server-cert.pem -days 1461
Create DH parameters (optional):
$ openssl dhparam -2 -out dhparams.pem 2048
$ openssl dhparam -2 -out dhparams.pem 4096
GnuTLS:
@ -59,7 +59,7 @@ Creating a self-signed certificate and key:
$ certtool --generate-privkey --bits 2048 --outfile server-key.pem
$ certtool --generate-self-signed --load-privkey server-key.pem --outfile server-cert.pem
Create DH parameters (optional):
$ certtool --generate-dh-params --bits 2048 --outfile dhparams.pem
$ certtool --generate-dh-params --bits 4096 --outfile dhparams.pem
Alternate approach using stunnel(1)

View File

@ -51,7 +51,7 @@ static bool ConnSSL_LoadServerKey_openssl PARAMS(( SSL_CTX *c ));
#include <unistd.h>
#include <gnutls/x509.h>
#define DH_BITS 1024
#define DH_BITS 2048
static gnutls_certificate_credentials_t x509_cred;
static gnutls_dh_params_t dh_params;