https://bz.apache.org/bugzilla/show_bug.cgi?id=59087

--- Comment #9 from Björn Jacke <bjo...@j3e.de> ---
It is not possible to iterate once over the certs and use the strongest cert
for the DH param size calculation?

But in any case: If we *know* that we mis-calculate the DH param size with
openssl 1.0.1, then we should at least set the minimum DH param length to a
reasonable secure size. And 1024 is considered not secure these days. The best
solution then would be to increase the minimum DH param size e.g. to 2048,
wouldn't it? People who have interoperability issues with large DH sizes
because of Java clients or whatever can still set fixed DH parameters as
commented in ssl_engine_kernel.c already for the current (weak) 1024 limit.

-- 
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: docs-unsubscr...@httpd.apache.org
For additional commands, e-mail: docs-h...@httpd.apache.org

Reply via email to