Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

Commit 2e826ad

Browse filesBrowse files
tniessenRafaelGSS
authored andcommitted
doc: fix (EC)DHE remark in TLS docs
It is not true that all TLS 1.3 cipher suites use ECDH. TLS 1.3 allows DH over finite fields instead of elliptic curves. Also, the key exchange mechanism is independent of the cipher suite in TLS 1.3. PR-URL: #46114 Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl> Reviewed-By: Luigi Pinca <luigipinca@gmail.com>
1 parent 5261560 commit 2e826ad
Copy full SHA for 2e826ad

File tree

Expand file treeCollapse file tree

1 file changed

+2
-2
lines changed
Open diff view settings
Filter options
Expand file treeCollapse file tree

1 file changed

+2
-2
lines changed
Open diff view settings
Collapse file

‎doc/api/tls.md‎

Copy file name to clipboardExpand all lines: doc/api/tls.md
+2-2Lines changed: 2 additions & 2 deletions
  • Display the source diff
  • Display the rich diff
Original file line numberDiff line numberDiff line change
@@ -141,8 +141,8 @@ not required and a default ECDHE curve will be used. The `ecdhCurve` property
141141
can be used when creating a TLS Server to specify the list of names of supported
142142
curves to use, see [`tls.createServer()`][] for more info.
143143

144-
Perfect forward secrecy was optional up to TLSv1.2, but it is not optional for
145-
TLSv1.3, because all TLSv1.3 cipher suites use ECDHE.
144+
Perfect forward secrecy was optional up to TLSv1.2. As of TLSv1.3, (EC)DHE is
145+
always used (with the exception of PSK-only connections).
146146

147147
### ALPN and SNI
148148

0 commit comments

Comments
0 (0)
Morty Proxy This is a proxified and sanitized view of the page, visit original site.