Vulnerability >> logjam << downgrades TLS connections to 512 Bit

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, May 20, 2015 at 5:39 AM, Ben Humpert <ben at an3k.de> wrote:
> Technical report: https://weakdh.org/imperfect-forward-secrecy.pdf
>
> Check your browser (currently all are affected) at https://weakdh.org/
>
> Check your Server at https://weakdh.org/sysadmin.html
>
> Deploying Guide: https://weakdh.org/sysadmin.html

Also see "Minimum size of DH",
http://rt.openssl.org/Ticket/Display.html?id=3120&user=guest&pass=guest.
The problem of the small DH group was reported years ago.

I can't help but feel it contributes to this observation from the paper:

    We find that 82% of vulnerable servers use a
    single 512-bit group, allowing us to compromise
    connections to 7% of Alexa Top Million HTTPS sites.

Jeff


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux