|
Message-ID: <20151021170113.128d3a8e@silentmaxx> Date: Wed, 21 Oct 2015 17:01:13 +0200 From: Matthias Weckbecker <matthias@...kbecker.name> To: oss-security@...ts.openwall.com Subject: Re: Prime example of a can of worms On Mon, 19 Oct 2015 17:40:14 -0400 Daniel Kahn Gillmor <dkg@...thhorseman.net> wrote: [...] > On the flip side, saying "use only strong (>=2048bit today in 2015?), > well-known, well-structured, publicly-vetted groups" is very simple > guidance: clear and easy to follow. > Interestingly I noticed OpenSSH bumped their 'DH_GRP_MIN' to 2048 bit just a few days ago to account for precomputation attacks: http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/dh.h.diff? r1=1.13&r2=1.14 RFC4419 seems to recommend 1024 bit minimum, but the document appears to be from 2006. [...] > > --dkg Matthias
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.