>>  1. That there is a consent on high quality ciphers: for example right
> now there are roughly two fractions who agree what is the lesser evil: RC4
> or AES-CBC.
> 
> No, it is now clear that RC4 is the greater evil. The browsers have
> deployed defenses against the "BEAST" attack on CBC (the defense is "1/n-1
> record splitting"), and BEAST is an active attack which can only be used
> in some cases and which tends to leave evidence of the attempt. On the
> other hand, RC4 is apparently vulnerable to passive attacks, which are
> more serious.
> 
> (If I'm wrong and there actually *is* a faction who still prefers RC4
> despite the recent results against it, I'd like to read about it!)

I’m not going to argue ciphers with you because you’re obviously right and I 
already wrote elsewhere that I’m going to full defer to your judgement here.

To explain where the above came from and eg. Qualys is still somewhat for RC4 
as a fallback cipher: to the best of my knowledge[1], Apple’s desktop Safari 
browser ''still'' hasn’t activated record splitting in its latest version and 
is thus still vulnerable to BEAST (and doesn’t support TLS>1).  But that’s 
probably a corner case enough to ignore in the defaults and will hopefully 
resolve itself in Mavericks.

[1]: Mostly from 
https://community.qualys.com/blogs/securitylabs/2013/03/19/rc4-in-tls-is-broken-now-what
 and I’m not aware of any changes.
_______________________________________________
Twisted-Python mailing list
Twisted-Python@twistedmatrix.com
http://twistedmatrix.com/cgi-bin/mailman/listinfo/twisted-python

Reply via email to