Hanno Böck <ha...@hboeck.de> writes:

>I suggest reading:
>https://blog.hboeck.de/archives/841-Diffie-Hellman-and-TLS-with-nonsense-parameters.html
>https://eprint.iacr.org/2016/644
>https://www.openssl.org/news/secadv/20160128.txt

This just confirms what I said previously, this is an overreaction to a
completely artificial situation.  The first link is to a problem with a badly
broken implementation, the second and third are to the use of maliciously-
generated parameters.  If your server is deliberately serving up malicious
parameters then you have bigger things to worry about than the crypto.

To put this another way, if I show that a malicious server can break TLS 1.3,
does that mean we have to throw it out and start bikeshedding TLS 1.4?

Peter.


_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to