Am 25.01.2017 um 23:00 schrieb Robert J. Hansen: >> The main problem would be its 64-bit block size. Apparently there's a >> "practical" attack against 64-bit ciphers as used in TLS [1]. > > Quoting from the abstract: "In our proof-of-concept demos, the attacker > needs to capture about 785GB of data." I question the wisdom of any system > which sends 785Gb of data without ever rekeying. > > This attack seems to fall into the realm of "stupid SSL mistakes lead to > exploitation. " >
There are prove of concepts against TLS and openvpn https://sweet32.info/ It is not quite that simple I think. _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users