[Cryptography] FREAK attack
    Tom Mitchell 
    mitch at niftyegg.com
       
    Mon Mar  9 22:36:27 EDT 2015
    
    
  
On Sat, Mar 7, 2015 at 2:02 PM, Jason Richards <jjr2 at gmx.com> wrote:
> Jerry Leichter:
> >On Mar 6, 2015, at 9:05 PM, Salz, Rich <rsalz at akamai.com> wrote:
> >> If FREAK shows 512K RSA can be factored in under half a day,
>
Have folk filed bugs against code with options and fall back to enable the
weak ciphers?
As a minimum the default config files should turn them off.   It is possible
that there is a need for a fragile key system but the quickest way to
discover
these is to turn off/ disable as many as possible.
-- 
  T o m    M i t c h e l l
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20150309/6111fd76/attachment.html>
    
    
More information about the cryptography
mailing list