Viktor Dukhovni <ietf-d...@dukhovni.org> writes:

>with confirmation from Peter Gutmann below that any custom groups we're
>likely to encounter are almost certainly safe

Well, I haven't examined every crypto library on the planet, it's not to say
there isn't something somewhere that implements its keygen as:

for i = 0 to 256
  dhprime[ i ] = rand();

but of the ones I'm aware of, when you ask for DLP parameters you get
something appropriate like Sophie Germain primes or FIPS 186 or equivalent,
e.g. Lim-Lee parameter generation.

>I don't see a realistic scenario in which sufficiently large ad-hoc server DH
>parameters are a problem.

+1.  Also if mentioning specific published values it'd be good to go with 3526
rather than 7919 due to the non-use of 7919 in implementations (unless there
are implementations using the 7919 primes while not implementing 7919 itself).

Peter.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to