"brian m. carlson" <sand...@crustytoothpaste.net> writes:

> In fact, I happen to know that the documentation for GnuTLS is wrong
> when it claims that "[t]here are no known weaknesses of" MD2.  Such
> weaknesses have been known for quite some time; in fact, certain
> weaknesses in the compression function have been known longer than
> (AFAICT) GnuTLS has existed.  And that's to say nothing about it being
> dog-slow (14 times slower than SHA-256).

You are right, I have updated the documentation:

http://git.savannah.gnu.org/cgit/gnutls.git/commit/?id=962013fa4b5c1da7a39e5249e146e80f8ca6a7ed

> gnutls-cli(1).  Looking at the source, RC4 is defined in SECURE256, and
> due to major weaknesses in its key scheduling (which can be used very
> effectively against e.g. WEP), I would absolutely not want to use it if
> any other choice were available.  Had I not looked at the source, I
> would never have known this.  I would certainly not class it as
> "secure".

I also feel uncomfortable including RC4 in the SECURE variants, we all
know that RC4 is not a secure cipher.  Nikos, what do you think about
removing it?

> I think it's reasonable to allow OpenSSL-compatible ciphersuite names.
> In fact, I think it's a really good idea.

It would be nice to support this, but nobody appears to be working on
this right now.

I have also wanted to be able to just use the official TLS ciphersuite
name to chose an algorithm.  For example, a priority string of
"TLS_DH_RSA_WITH_AES_256_CBC_SHA" means to enable all TLS versions, RSA,
AES-256, and SHA.  Right now it is difficult to express this.

/Simon



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to