notes:tls
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| notes:tls [2023/10/10 23:56] – david | notes:tls [2024/04/09 21:33] (current) – david | ||
|---|---|---|---|
| Line 4: | Line 4: | ||
| [[https:// | [[https:// | ||
| + | |||
| + | === Certificate order === | ||
| + | leaf certificate followed by intermediaries and root, see " | ||
| + | [[https:// | ||
| + | [[https:// | ||
| + | |||
| [[https:// | [[https:// | ||
| - | Choosing an Elliptic Curve in 2022 | + | use the Mozilla SSL Config generator to generate strong SSL configuration |
| + | https:// | ||
| + | |||
| + | ===ECC=== | ||
| + | * Use NIST SuiteB P-256 or P-384 curves | ||
| + | * Choosing an Elliptic Curve in 2022 | ||
| https:// | https:// | ||
| - | use the Mozilla SSL Config generator to generate strong SSL configuratoin | + | https:// |
| - | https://ssl-config.mozilla.org/ | + | |
| + | Guidelines for the Selection, | ||
| + | |||
| + | https://nvlpubs.nist.gov/ | ||
| + | |||
| + | |||
| + | If the server is configured with an ECDSA signature certificate, | ||
| + | |||
| + | |||
| + | ECDSA key lengths page 6 https:// | ||
| + | |||
| + | |||
| + | |||
| + | ==== Certificate management ==== | ||
| + | |||
| + | https:// | ||
| + | |||
| + | NIST SP 800-131A Rev. 2 | ||
| + | |||
| + | Transitioning the Use of Cryptographic Algorithms and Key Lengths | ||
| + | |||
| + | https:// | ||
| + | |||
| + | |||
| + | Recommendation for Key Management: \\ | ||
| + | Part 2 - Best Practices for Key Management Organizations \\ | ||
| + | https:// | ||
| + | |||
| + | |||
| + | |||
| + | CAB Forum | ||
| + | https:// | ||
| + | |||
| + | RFC 9325\\ | ||
| + | Recommendations for Secure Use of Transport Layer\\ | ||
| + | Security (TLS) and Datagram Transport LayerSecurity (DTLS) | ||
| + | |||
| + | RFC-8446 - The Transport Layer Security (TLS) Protocol Version 1.3 | ||
| + | |||
| + | |||
| + | |||
| + | |||
| + | |||
| + | https:// | ||
| + | Table 2 | ||
| + | Acceptable key lengths | ||
| + | >= 224 bits of security strength for ECDSA and EdDSA | ||
| + | RSA >= 2048 | ||
| + | |||
| + | |||
| + | |||
| + | NIST Special Publication 800-56A\\ | ||
| + | Revision 3\\ | ||
| + | Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete | ||
| + | Logarithm Cryptography\\ | ||
| + | https:// | ||
| + | ===== Cipher Suites ==== | ||
| + | https:// | ||
notes/tls.1696996591.txt.gz · Last modified: by david
