[Cryptography] FREAK attack
Tom Mitchell
mitch at niftyegg.com
Mon Mar 9 22:36:27 EDT 2015
On Sat, Mar 7, 2015 at 2:02 PM, Jason Richards <jjr2 at gmx.com> wrote:
> Jerry Leichter:
> >On Mar 6, 2015, at 9:05 PM, Salz, Rich <rsalz at akamai.com> wrote:
> >> If FREAK shows 512K RSA can be factored in under half a day,
>
Have folk filed bugs against code with options and fall back to enable the
weak ciphers?
As a minimum the default config files should turn them off. It is possible
that there is a need for a fragile key system but the quickest way to
discover
these is to turn off/ disable as many as possible.
--
T o m M i t c h e l l
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20150309/6111fd76/attachment.html>
More information about the cryptography
mailing list