On 23/09/13 09:47, Peter Gutmann wrote:
Patrick Pelletier <c...@funwithsoftware.org> writes:

I'm inclined to agree with you, but you might be interested/horrified in the
"1024 bits is enough for anyone" debate currently unfolding on the TLS list:

That's rather misrepresenting the situation.  It's a debate between two
groups, the security practitioners, "we'd like a PFS solution as soon as we
can, and given currently-deployed infrastructure DH-1024 seems to be the best
bet", and the theoreticians, "only a theoretically perfect solution is
acceptable, even if it takes us forever to get it".

(You can guess from that which side I'm on).

Lessee - a "forward secrecy solution" which either doesn't work now or won't work soon - so that it probably won't protect traffic made now for it's useful lifetime - versus - well, who said anything about theoretically perfect?

To hell with perfect. I won't even use the word when describing forward secrecy (unless it's an OTP).

If you just want a down-and-dirty 2048-bit FS solution which will work today, why not just have the websites sign a new RSA-2048 sub-certificate every day? Or every few hours? And delete the secret key, of course.

Forward secrecy doesn't have to be per-session.


Though frankly, I don't think ubiquitous 1024-bit FS without deployment of some software/RFC/standard is possible, and if so that deployment should also include a 2048-bit solution as well. And maybe 3072-bit and 4096-bit solutions too.

And please please please don't call them all the same thing - because they aren't.



But, the immediate question before the court of TLS now is - "do we recommend a 1024-bit FS solution?"

And I for one cannot say that you should. In fact I would be horrified if you did.


-- Peter Fairbrother
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

Reply via email to