[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #18221 [Tor]: Validate our DH parameters to prevent socat-type fails.



#18221: Validate our DH parameters to prevent socat-type fails.
-----------------------------+------------------------------------
 Reporter:  yawning          |          Owner:
     Type:  enhancement      |         Status:  needs_review
 Priority:  Medium           |      Milestone:  Tor: 0.2.8.x-final
Component:  Tor              |        Version:  Tor: unspecified
 Severity:  Normal           |     Resolution:
 Keywords:  tor-core crypto  |  Actual Points:
Parent ID:                   |         Points:
  Sponsor:                   |
-----------------------------+------------------------------------

Comment (by bugzilla):

 > TAP handshake
 It's not ephemeral and has one IIRC "key" for all HSes, or not?
 > less likely
 If an adversary could make a fallback in TLS session, then it'd be
 seamless for the user.
 > Use P-256
 It's not so good as it seems. 256-bit PK is theoretically strong as
 128-bit AES key, but 112-bit can be broken, and the same for 128-bit in
 the near future. And what's then? Urgently disable P-256 fallback from
 P-384?

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/18221#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs