Ilari Liusvaara <ilariliusva...@welho.com> writes:

>1) Advertise DHE, accept weak groups. Vulernable to LOGJAM.

Only if the weak groups you accept are 512 bits.

A bigger question is, why does Chrome think it's up to it to decide whether
the device user's choice of key size is appropriate or not?  As I mentioned
earlier, in many cases 1024-bit keys are not only perfectly fine but more than
enough.  In fact given the hardness of the DLP they're probably OK in
virtually all cases as long as everyone doesn't share the same group2 prime.

The crazy thing is that although Chrome rejects a connection to a PFS,
relatively safe (via the DLP's hardness) 1024-bit DHE server, it's perfectly
happy connecting to a far less safe (both in terms of factorability and use of
pure RSA) 1024-bit RSA server.  

This is "security" done backwards!

Peter.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to