[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #27971 [Core Tor/Tor]: Still supports 1024 bit keys
#27971: Still supports 1024 bit keys
--------------------------------+------------------------------------
Reporter: kroeckx | Owner: nickm
Type: defect | Status: assigned
Priority: High | Milestone: Tor: 0.3.5.x-final
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: crypto regression? | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------+------------------------------------
Comment (by nickm):
Okay, I've investigated this a bit more.
Changing TLS_DH_PRIME to a 2048-bit prime is easy enough; after doing so,
the 0.3.5 unit tests almost pass at security level 2, and "make test-
network" passes.
In 0.2.9, increasing the TLS prime length to 2048 is also okay. However,
in 0.2.9, raising the security level to 2 makes a few dozen unit tests
fail.
Here's what I'd propose:
* Raise the TLS prime size to the 2048-bit named prime from RFC7919 in
0.2.9 and forward, fixing unit tests as needed.
* In versions before 0.3.4 or 0.3.5, move the
SSL_CTX_set_security_level(1) call to only happen in the unit tests.
* In 0.3.5, remove the SSL_CTX_set_security_level() call entirely, and
fix the one failing unit test.
(I only tested this with OpenSSL 1.1.0i -- there might well be
compatibility issues with other versions for us to sort out.)
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/27971#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs