[146707] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] People should turn on PFS in TLS

daemon@ATHENA.MIT.EDU (Chris Palmer)
Fri Sep 6 22:12:39 2013

X-Original-To: cryptography@metzdowd.com
In-Reply-To: <522A747C.3090700@virtadpt.net>
Date: Fri, 6 Sep 2013 18:02:22 -0700
From: Chris Palmer <snackypants@gmail.com>
To: drwho@virtadpt.net
Cc: "cryptography@metzdowd.com list" <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On Fri, Sep 6, 2013 at 5:34 PM, The Doctor <drwho@virtadpt.net> wrote:

> Symmetric cipher RC4 (weak 10/49)
> Symmetric key length 128 bits (weak 8/19)
> Cert issued by Google, Inc, US SHA-1 with RSA @ 2048 bit (MODERATE 2/6)

First time I've heard of 128-bit symmetric called "weak"... Sure, RC4
isn't awesome but they seem to be saying that 128-bit keys per se are
weak.

> Let's contrast this with ChaosPad:
> Symmetric cipher Camellia (STRONG 39/39)
> Symmetric key length 256 bits (STRONG 19/19)
> Cert issued by CAcert, Inc. SHA-1 with RSA @ 4096 bit (MODERATE 2/6)

Without good server authentication, the other stuff doesn't matter.
With Chrome, you get key pinning when talking to some sites (including
Google sites, Tor, and Twtitter); I'd much rather have that and "only"
128-bit symmetric. Also, I don't know why you weren't getting forward
secrecy; check your Firefox configuration.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post