Re: Fedora/Redhat and perfect forward secrecy

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




Am 09.09.2013 12:55, schrieb Florian Weimer:
> On 09/09/2013 11:58 AM, Andrew Haley wrote:
>> On 09/07/2013 12:52 AM, Gregory Maxwell wrote:
>>> Regardless, I think that argument would be an ignorant one:
>>> Approximately no one runs non-ECDH PFS on the web: it's insanely slow
>>> and it breaks clients.
>>
>> Hmm.  Isn't non-ECDH PFS just straight integer (mod N) Diffie-Hellman?
> 
> Yes, it is.
> 
>> And that's what is insanely slow?
> 
> I don't get it, either

google "dhe versus ecdhe performance"

http://vincent.bernat.im/en/blog/2011-ssl-perfect-forward-secrecy.html
>> Let’s focus on the server part. Enabling DHE-RSA-AES128-SHA cipher suite
>> hinders the performance of TLS handshakes by a factor of 3. Using
>> ECDHE-RSA-AES128-SHA instead only adds an overhead of 27%. However, if we
>> use the 64bit optimized version, the cost is only 15%

is that enough to understand why nobody on this world is using DHE and so your
"Current Fedora supports perfect forward secrecy just fine" is *far* away
from the reality?

it does not help much support forward secrecy in a way *nobody* else on this
planet is supporting it and so you repsonse below is uneducated - period

-------- Original-Nachricht --------
Betreff: Re: Fedora/Redhat and perfect forward secrecy
Datum: Mon, 26 Aug 2013 11:07:29 +0200
Von: Florian Weimer <fweimer@xxxxxxxxxx>
An: Development discussions related to Fedora <devel@xxxxxxxxxxxxxxxxxxxxxxx>
Kopie (CC): Reindl Harald <h.reindl@xxxxxxxxxxxxx>, Mailing-List fedora-users <users@xxxxxxxxxxxxxxxxxxxxxxx>

On 08/24/2013 11:38 AM, Reindl Harald wrote:
> https://bugzilla.redhat.com/show_bug.cgi?id=319901
>
> looks like Redhat based systems are the only remaining
> which does not support EECDHE which is a shame these
> days in context of PRISM and more and more Ciphers
> are going to be unuseable (BEAST/CRIME weakness)

Current Fedora supports perfect forward secrecy just fine.  It's just
that web server operators routinely refuse to offer it.  (The situation
is different with mail servers.)  Operational benefits look rather
marginal to me.  It may discourage interested parties from requesting
server private keys, but even that isn't assured.

Attachment: signature.asc
Description: OpenPGP digital signature

-- 
users mailing list
users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org
[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [EPEL Devel]     [Fedora Magazine]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Desktop]     [Fedora Fonts]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Fedora Sparc]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux