bsmith: the Diffie-Hellman private keys generated by NSS are hardcoded to be 160 bits long: http://bonsai.mozilla.org/cvsblame.cgi?file=mozilla/security/nss/lib/freebl/dh.c&rev=1.11&mark=24#24
The private key length should be the same as the length of the q parameter. So for a 2048-bit p, q should be either 224 or 256 bits. A 160-bit q is only appropriate for a 1024-bit p. Private key length should max out at 512 bits (at the 256-bit security level). We can come up with a step function that returns these discrete private key lengths depending on the size of p: 160 bits 224 bits 256 bits 384 bits 512 bits See NIST SP 800-57, Table 2 and http://www.keylength.com/en/4/ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1002434 Title: TLS interoperability issue in NSS based software To manage notifications about this bug go to: https://bugs.launchpad.net/nss/+bug/1002434/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs