[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] [Cryptography] 1024 bit DH still common in Tor network



----- Forwarded message from "Perry E. Metzger" <perry@xxxxxxxxxxxx> -----

Date: Fri, 6 Sep 2013 16:34:10 -0400
From: "Perry E. Metzger" <perry@xxxxxxxxxxxx>
To: cryptography@xxxxxxxxxxxx
Subject: [Cryptography] 1024 bit DH still common in Tor network
X-Mailer: Claws Mail 3.9.0 (GTK+ 2.24.20; x86_64-apple-darwin12.4.0)

Summary: blog posting claims most of the Tor network is still running
older software that uses 1024 bit Diffie-Hellman.

http://blog.erratasec.com/2013/09/tor-is-still-dhe-1024-nsa-crackable.html

I'm not sure how cheap it actually would be to routinely crack DH key
exchanges, but it does seem like it would be valuable for
most Tor nodes to be running newer software anyway.

-- 
Perry E. Metzger		perry@xxxxxxxxxxxx
_______________________________________________
The cryptography mailing list
cryptography@xxxxxxxxxxxx
http://www.metzdowd.com/mailman/listinfo/cryptography

----- End forwarded message -----
-- 
Eugen* Leitl <a href="http://leitl.org";>leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B  47EE F46E 3489 AC89 4EC5
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk