[146683] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

[Cryptography] 1024 bit DH still common in Tor network

daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Fri Sep 6 16:34:16 2013

X-Original-To: cryptography@metzdowd.com
Date: Fri, 6 Sep 2013 16:34:10 -0400
From: "Perry E. Metzger" <perry@piermont.com>
To: cryptography@metzdowd.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

Summary: blog posting claims most of the Tor network is still running
older software that uses 1024 bit Diffie-Hellman.

http://blog.erratasec.com/2013/09/tor-is-still-dhe-1024-nsa-crackable.html

I'm not sure how cheap it actually would be to routinely crack DH key
exchanges, but it does seem like it would be valuable for
most Tor nodes to be running newer software anyway.

-- 
Perry E. Metzger		perry@piermont.com
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post