On Thu, 2014-02-27 at 10:37 -0800, Andrew Lutomirski wrote:
> In that case, why not give full control:
> allowed_ciphers = AES-192, AES-256, Salsa20/12, Salsa20/20
> allowed_groups = modp >= 2048, P-256, Curve25519
> allowed_hashes = SHA-3, ...
> allowed_modes = CTR, OCB, XTS, GCM
> allowed_macs = ...

Because of two reasons:
1. A typical administrator isn't a cryptographer. Most people cannot
distinguish noise from the algorithms that you mention above.

2. That proposal has to work with very different libraries that don't
provide the same level of access to their internals. 

Thus the practical solution is to handle pre-defined common policies
rather than provide unlimited tuning for every possible purpose (that
can be done by overriding the defaults).

regards,
Nikos


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Reply via email to