learning_curve
Golden Pleskian
Still unsure about your answer to our last question about you using CryptCheck to check DH key size
i.e. How was your experience when using it?
but what exactly where you expecting us to see clearly using this and/or what is your own experience when using it?
From your statement, it appears unecessary to use both at the same time?
Or we have we completely misunderstaood your post?
i.e. How was your experience when using it?
Okay we have tried this thank you, but for us, this is again confusing. What we actually get when running this, is lots of information yes, but all about the SSL certificate that we have in place covering Plesk. Useful, but as we know already, the SSL certificate itself only has a DH2048 encryption. In our example test results, this line is also included FWIWYou can use directly openssl via ssh to test your server ssl configuration:Code:openssl s_client -connect yourplesk.server.ltd:8443
Code:
Peer signing digest: SHA512
Server Temp Key: ECDH, P-521, 521 bits
Wow, that's a new area for us now. If this is correct; "any ECDHE configuration will be better than a classic DHE configuration" then what is the pupose behind us all including this coding in our setups?About ECC, curves P-384 provide the same encryption than a RSA key of 7680 bits. So any ECDHE configuration will be better than a classic DHE configuration
Code:
TLSDHParamFile /etc/dhparam/dhparam4096.pem
Or we have we completely misunderstaood your post?
^^ UnderstoodI do not have any issue with the curves P-256 and P-384.Code:ssl_ecdh_curve X25519:P-521:P-384; # new nginx releases ssl_ecdh_curve secp521r1:secp384r1; # normal nginx configuration ssl_ecdh_curve secp384r1; # old version of nginx