karsten.n@xxxxxxxxxxx: > An other more advanced solution for TorBrowser would be possible. You can > increase the min. length for DH parameter to 2048 bit in NSS lib. Min. > length for DH parameter was set to 1024 in NSS 3.19.1 to avoid Logjam > attack. May be, it is time to increase it to 20148 bit? > https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.1_release_notes Might be an idea for https://bugs.torproject.org/17374. I'd actually like to see how much would break doing this (or the EFF proposal). I guess quite a lot which makes me wondering whether this could be a feature for the level "High" on the security slider. Georg
Attachment:
signature.asc
Description: OpenPGP digital signature
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk