On Sat, Sep 05, 2015 at 02:41:51PM +0000, Alfonso De Gregorio wrote: > >> A key-recovery attack may allow the retroactive decryption of past > >> communication sessions, if the network endpoints rely on fixed > >> Diffie-Hellman. Of course, whenever an attacker can successfully mount > >> a MITM attack the current sessions are compromised. > >> > > > > Thanks. Are you referring to "DH as per the fucked RFC" or as "DH > > implemented > > properly"? > > I'm concerned with Fixed Diffie-Hellman implemented properly. >
Do you have example of application which distinguishes proper DH from non-proper DH?
