On Wed, Jun 4, 2014 at 5:50 PM, Daniel Kahn Gillmor
wrote:
> On 06/04/2014 03:30 AM, Nikos Mavrogiannopoulos wrote:
>> I agree with your points. In fact the current warning was setup to
>> cover (0). There could be another warning for (1), but gnutls-cli
>> prints the size of the prime anyway if D
Hi Daniel, nice to meet you.
>> |<1>| Note that the security level of the Diffie-Hellman key exchange
>> has been lowered to 256 bits and this may allow decryption of the
>> session data
> 0) a warning that the configuration has lowered the DH key exchange
> strength and may cause weakness (what
On 06/04/2014 03:30 AM, Nikos Mavrogiannopoulos wrote:
> I agree with your points. In fact the current warning was setup to
> cover (0). There could be another warning for (1), but gnutls-cli
> prints the size of the prime anyway if DHE is negotiated so I'm not
> sure how much another warning would
On Tue, Jun 3, 2014 at 12:33 AM, Daniel Kahn Gillmor
wrote:
> over on https://bugs.debian.org/750094,
>> This warning is printed before any TLS negotiation happens, so it does not
>> reflect the parameters that were actually negotiated. The wording should
>> be changed in order to make it clear t
over on https://bugs.debian.org/750094,
On 06/01/2014 10:01 AM, Juliusz Chroboczek wrote:
> Package: gnutls-bin
> Version: 3.2.14-1
>
> Try the following:
>
> gnutls-cli --dh-bits 256 --starttls -p 80 www.debian.org
>
> It prints the following warning:
>
> |<1>| Note that the security leve
Package: gnutls-bin
Version: 3.2.14-1
Try the following:
gnutls-cli --dh-bits 256 --starttls -p 80 www.debian.org
It prints the following warning:
|<1>| Note that the security level of the Diffie-Hellman key exchange
has been lowered to 256 bits and this may allow decryption of the
sess
6 matches
Mail list logo