Hi, Any statement for iked?
On Thu, May 21, 2015 at 12:51 AM, Gilles Chehade <gil...@poolp.org> wrote: > On Wed, May 20, 2015 at 11:55:42PM +0200, L.R. D.S. wrote: > > Anyone write today on @misc and @tech about this, so I'll ask just to > make sure: > > is OpenIKED and/or OpenSMTPD vulnerable to this new "Logjam Attack"? > > This vulnerability allow "a man-in-the-middle attacker to downgrade > vulnerable TLS > > connections to 512-bit export-grade cryptography" and "[Since] Millions > of HTTPS, > > SSH, and VPN servers all use the same prime numbers for Diffie-Hellman > key exchange" > > "[using it] an attacker can quickly break individual connections" [...] > "attacks on > > VPNs are consistent with having achieved such a break."[1]. They have a > proof of > > concept[2] and a research paper[3]. > > > > As far as OpenSMTPD is concerned: > > "The attack affects any server that supports DHE_EXPORT ciphers, > and affects all modern web browsers." (from weakdh.org) > > The default cipher-suite is "HIGH:!aNULL:!MD5" which doesn't support any > DHE_EXPORT cipher (obvious but verified with both LibreSSL and OpenSSL): > > $ openssl ciphers HIGH:!aNULL:!MD5|grep EXPORT > $ > > > "Millions of HTTPS, SSH, and VPN servers all use the same prime numbers > for Diffie-Hellman key exchange. [...]" > > Yes, there is a very popular set of 512-bits DH parameters that everyone > uses because it was considered safe to share the params if generated the > right way. It is part of tons of examples, documented as "safe to reuse" > and it ended pretty much everywhere (openssl s_server to name one). > > We have switched to 1024-bits DH parameters 4 years ago: > > > http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/smtpd/ssl.c.diff?r1=1.3 1&r2=1.32&f=h > > The DH parameters were generated by myself on a safe machine, so there's > very very low chances "millions of servers" are sharing the same ones ;) > > The article suggests that 1024-bits DH isn't enough and that you need it > to be at least 2048-bits, however before we bump this default, we need a > fair amount of testing: last time I tried, it broke A LOT of exchanges. > > Discussions will take place with regard to what we'll do anways... > > > -- > Gilles Chehade > > https://www.poolp.org @poolpOrg > > -- Pablo Méndez Hernández