On Thu, Jan 1, 2009 at 9:56 AM, Sam Morris <[email protected]> wrote:
> Maybe in a few years, NSS will have disabled the use of MD5 and the
> ancient MD2 algorithm. I wonder how many other insecure algorithms are
> still lurking in NSS, OpenSSL, GNU TLS, Java, etc...

Having programmed with OpenSSL a fair amount, I can say that the
problem isn't that the library has older algorithms in it.  That's
needed for legacy compatibility.  When initializing the library's
engine, or for a specific connection, you specify the acceptable
algorithms, so a particular application can reject MD2 or MD5
entirely.  For the openssl binary, it's a question of how it's
configured at compile- and run-time.  The default at least is to use
SHA-1.  More worrisome is that RSA keys are generated with only
512-bit moduli by default, but that may be a holdover from US export
regulations.

-- 
Michael A. Marsh
http://www.umiacs.umd.edu/~mmarsh
http://mamarsh.blogspot.com
http://36pints.blogspot.com


-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to