[Cryptography] FREAK attack

Tom Mitchell mitch at niftyegg.com
Mon Mar 9 22:36:27 EDT 2015

On Sat, Mar 7, 2015 at 2:02 PM, Jason Richards <jjr2 at gmx.com> wrote:

> Jerry Leichter:
> >On Mar 6, 2015, at 9:05 PM, Salz, Rich <rsalz at akamai.com> wrote:
> >> If FREAK shows 512K RSA can be factored in under half a day,

Have folk filed bugs against code with options and fall back to enable the
weak ciphers?

As a minimum the default config files should turn them off.   It is possible
that there is a need for a fragile key system but the quickest way to
these is to turn off/ disable as many as possible.

  T o m    M i t c h e l l
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20150309/6111fd76/attachment.html>

More information about the cryptography mailing list