You can control both the priority ordering and range of Elliptic Curves used to negotiate with connecting peers when establishing connections using ECDHE or ECDH cipher suites.
If the key's ECC curve is not present, no Elliptic Curve Digital Signature Algorithm (ECDSA) cipher suite connections can be established. Any certificate bearing an unconfigured or misconfigured ECC curve is treated as untrusted because its ECC curve is unknown to the system.
In a dual certificate configuration and if the connecting client is not configured for ECDSA only then the RSA identity certificate and any issuing CA chain might still establish a listening endpoint using the alternative certificate and RSA key. In these circumstances ECDHE-RSA or ECDH-RSA cipher suites are used.
When listing ECC curves, the priority order is read from left to right with the highest priority on the left. Any combination of spaces, commas, and semicolons can be used as separators for ECC curves. By default, the following ECC curve collection is used:
secp521r1;secp384r1;prime256v1;secp256k1;secp224r1;secp224k1;prime192v1
You can specify your preferred ECC curve collection in the ECC curve collection field. If ECC curves are duplicated in the list, the first example encountered sets its priority position. All subsequent duplicates are ignored. For example, secp521r1 is the highest priority ECC curve. While secp256k1 is the fourth highest priority curve despite also being found at position ten in the list:
secp521r1;secp384r1;prime256v1,secp256k1,secp224r1;secp224k1;secp521r1;secp384r1;prime256v1;secp256k1;secp224r1;secp224k1;prime192v1
Any specified curve collection replaces the default collection. If no configuration is specified, the default ECC curve collection is the ECC curve collection listed above. The priority order is determined by the cryptographic service provider.
To optimize the ECC curve collection to have the highest level of security while providing the greatest level of compatibility with clients, Micro Focus recommends you specify the following ECC curve collection:
secp521r1;brainpoolP512r1;brainpoolP384r1;brainpoolP256r1;secp384r1;prime256v1;secp256k1;secp224k1;secp224r1;prime192v1
Micro Focus recommends you avoid using the following ECC Prime Curves which are now considered insecure: