RC4-MD5

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Jul 8, 2015 at 1:24 PM, Rajeswari K <raji.kotamraju at gmail.com> wrote:
> Hello Openssl team,
>
> We are currently facing an issue with RC4-MD5 cipher suite after upgrading
> from openssl0.9.8q to openssl1.0.1j.
>
> We see that on few platforms, RC4-MD5 cipher negotiation is returning bad
> mac record error after receiving "Client Key Exchange" message.

I've seen it the other way: 0.9.8 produces a bad mac; while 1.0 clears
the issue.

> Currently we are using proprietary md5 functions with following
> configuration .
>
> ...
>  Is there any consideration for MD5 based on platform bits? Can anyone
> share?

Just bike shedding, but these are the two ciphers that browsers are
targeting for deprecation. See, for example,
https://www.google.com/search?q=obsolete+cryptography+warning+chrome.

The time might be better spent on avoiding both RC4 and MD5. That will
keep your users out of of those browser security UX prompts that they
don't know how to answer.

But like I said, its just bike shedding.


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux