Conversation

What browsers/percent of users/legacy clients can't do ECDSA certs these days? A few years back AWS Cloudfront couldn't, but I assume that's been upgraded? Anything else?
6
2
Replying to and
ECDHE with x25519 can be used with an RSA certificate. The key for the certificate doesn't have to be secure over the long term when using proper modern ciphers with forward secrecy. Even old browsers can do it. The session keys matter a lot more and need to be secure long-term.
1
1
The certificate key needs to be secure enough to prevent active interception. Even RSA 2048 is still more than good enough. Session keys would ideally be stronger than what nearly everyone currently uses because that's what actually needs to be broken to get the data later on.
1
2
It's only Internet Explorer where you had to use ECDSA to use ECDHE ciphers. It supports DHE though, so you can still do forward secrecy for Internet Explorer with RSA. Can set up DHE to use 3072 bit keys so it has a comparable security level too. Unnecessarily complex though.
1
Replying to and
Ed448 is the higher security level partner for Ed25519. It's included in TLS 1.3 as one of the standard curves. US government (NIST) has approved both of these curves so they clearly see the advantages themselves. It makes more sense to add that than looking to the past now.
It should have been left to the server admins choice and so fixed the bug. Going forward, I agree but you don't see 448 support like 521. Perhaps it would have helped Brad, if they had removed RSA for performance reasons, instead๐Ÿค” with cries of backlash, of course.
1
Show replies