[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #18274 [Tor Browser]: 3DES_EDE_CBC cipher is vulnerable in the current TBB configuration!



#18274: 3DES_EDE_CBC cipher is vulnerable in the current TBB configuration!
--------------------------+--------------------------
 Reporter:  bugzilla      |          Owner:  tbb-team
     Type:  defect        |         Status:  closed
 Priority:  Medium        |      Milestone:
Component:  Tor Browser   |        Version:
 Severity:  Major         |     Resolution:  invalid
 Keywords:  tbb-security  |  Actual Points:
Parent ID:                |         Points:
  Sponsor:                |
--------------------------+--------------------------

Comment (by bugzilla):

 Ok. I was too hurry that hadn't checked Mozilla's whitelisting. But today
 a lot of security labs propose disabling SHA at all, not saying about
 112-bit deprecated ciphers. And, thank you, cypherpunks, for
 > [https://bugzilla.mozilla.org/show_bug.cgi?id=1139778 Bug 1139778]
 > >The usage rate of 3DES is still too high to use whitelist
 But that citation refers to a research
 https://tools.ietf.org/agenda/91/slides/slides-91-saag-3.pdf#page=12
 where:
 '''29-oct-2014''', 3DES, share in % - '''0,1'''
 last date of SSLv3, share in % - 0,26
 last date of RC4, share in % - 25,2

 So disabling 3DES is easier then RC4.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/18274#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs