Thanks to Nico for bringing the focus on DH as the central ingredient of
PFS.
Nico Williams wrote:
But first we'd have to get users to use cipher suites with PFS. We're
not really there.
Why?
Perfect forward secrecy (PFS) is an abstract security property defined
because Diffie-Hellman
Forward secrecy is exceedingly important security property. Without it an
attacker can store encrypted messages via passive eavesdropping, or court
order an any infrastructure that records messages (advertised or covert) and
then obtain the private key via burglary, subpoena, coercion or
Adam Back wrote:
Forward secrecy is exceedingly important security property. Without it an
attacker can store encrypted messages via passive eavesdropping, or court
order an any infrastructure that records messages (advertised or covert)
and
then obtain the private key via burglary,
I do not think it is a narrow difference. End point compromise via
subpoena, physical seizing, or court mandated disclosure are far different
things than pre-emptive storing and later decryption. The scale at which a
society will do them, and tolerate doing them given their inherently
increased
On Tue, Jul 2, 2013 at 1:52 PM, Ben Laurie b...@links.org wrote:
On 2 July 2013 16:07, Adam Back a...@cypherspace.org wrote:
On Tue, Jul 02, 2013 at 11:48:02AM +0100, Ben Laurie wrote:
On 2 July 2013 11:25, Adam Back a...@cypherspace.org wrote:
does it provide forward secrecy (via k' =
On Tue, Jul 2, 2013 at 10:07 AM, Adam Back a...@cypherspace.org wrote:
On Tue, Jul 02, 2013 at 11:48:02AM +0100, Ben Laurie wrote:
On 2 July 2013 11:25, Adam Back a...@cypherspace.org wrote:
does it provide forward secrecy (via k' = H(k)?).
Resumed [SSL] sessions do not give forward
On Tue, Jul 02, 2013 at 11:48:02AM +0100, Ben Laurie wrote:
On 2 July 2013 11:25, Adam Back a...@cypherspace.org wrote:
does it provide forward secrecy (via k' = H(k)?).
Resumed [SSL] sessions do not give forward secrecy. Sessions should be
expired regularly, therefore.
That seems like an
On 2 July 2013 16:07, Adam Back a...@cypherspace.org wrote:
On Tue, Jul 02, 2013 at 11:48:02AM +0100, Ben Laurie wrote:
On 2 July 2013 11:25, Adam Back a...@cypherspace.org wrote:
does it provide forward secrecy (via k' = H(k)?).
Resumed [SSL] sessions do not give forward secrecy. Sessions
On Jul 2, 2013, at 1:52 PM, Ben Laurie b...@links.org wrote:
Alternatively, we stay in this world, clients expire sessions hourly,
and we're all happy.
Is this what most recent browsers do? They expire their TLS sessions after an
hour? That would be nice.
--Paul Hoffman
On Tue, July 2, 2013 2:02 pm, Paul Hoffman wrote:
On Jul 2, 2013, at 1:52 PM, Ben Laurie b...@links.org wrote:
Alternatively, we stay in this world, clients expire sessions hourly,
and we're all happy.
Is this what most recent browsers do? They expire their TLS sessions after
an hour?
On Jul 2, 2013, at 2:59 PM, Ryan Sleevi ryan+cryptogra...@sleevi.com wrote:
On Tue, July 2, 2013 2:02 pm, Paul Hoffman wrote:
On Jul 2, 2013, at 1:52 PM, Ben Laurie b...@links.org wrote:
Alternatively, we stay in this world, clients expire sessions hourly,
and we're all happy.
Is this
11 matches
Mail list logo