On Fri, Mar 28, 2014, Dr. Stephen Henson wrote: > On Fri, Mar 28, 2014, Viktor Dukhovni wrote: > > > On Fri, Mar 28, 2014 at 05:57:42PM +0100, Dr. Stephen Henson wrote: > > > > > > In the new Fedora we will try system-wide configuration parameters for > > > > all crypto libraries (patch [0] was along that line), so such a change > > > > is very good news. It would be nice if that branch was public for > > > > comments or so, but otherwise, it would be ideal if such parameters > > > > could be set using a cipher string. > > > > > > > > > > Early version added to the master branch. Still needs some work but should > > > give the general idea. What is included at each level should be considered > > > provisional and subject to change. > > > > Are we about to repeat the GunTLS breakage with client DH parameter > > size constraints in OpenSSL? DH parameter sizes are not negotiated > > in TLS, and enforcing aggressive lower bounds in TLS clients causes > > more harm than good. Clients that insist on NIST SP-800 consistent > > sizes above 1024 for DH primes are broken. Please do not go there, > > at least for security levels intended to be usable defaults for the > > public Internet (I think this includes at least levels 0, 1 and 2). > > > > Also, excluding RC4-SHA1 at security level 2, makes that level > > unusable on today's Internet. Is that really warranted? > > > > Why are session tickets disabled at security level 3 (128-bit)? > > RFC 5077 strongly suggests using AES128 for session tickets. Are > > there a lot of servers whose session tickets are expected to be > > using weaker algorithms? Session tickets improve performance of > > applications that connect and disconnect frequently, and make it > > practical to employ more expensive strong PKI operations for the > > full handshake, by ammortizing the cost via connection reuse. Why > > disable session tickets? > > > > Well what goes in each security level is up for discussion and can be changed. > > As you note level 2 and higher general will have problems with "today's > internet". Not just the RC4-SHA1 issue but also the fact that SHA1 for digital > signatures only offers 80 bits of equivalent security. >
One possibility I'd considered is to move levels 1 and above along one. Then you'd have... Level 0: anything goes. Level 1: almost anyting goes but stupid stuff like DH, RSA keys < 512 bits excluded. Level n: same as current level n-1. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager majord...@openssl.org