On Sun, Dec 28, 2014 at 11:40:02PM +0000, Gregory Maxwell wrote:
> http://www.spiegel.de/media/media-35552.pdf
> 
> >From 
> >http://www.spiegel.de/international/world/nsa-documents-attacks-on-vpn-ssl-tls-ssh-tor-a-1010525.html
> 
> The fact that they appear to have decrypted some but not all messages
> in a log suggests to me that this is not a host compromise, or an
> MITM. But potentially an attack on 1024 bit DH or AES-CTR?

OTR uses 1536-bit DH, not 1024-bit DH.

It's possible the transcript on the second page of that PDF shows
protocol messages (OTR Query, key exchange, etc.) messages.  But I don't
have a similar explanation for the ones after the undecryptable OTR
messages on the first page.

   - Ian
_______________________________________________
OTR-dev mailing list
OTR-dev@lists.cypherpunks.ca
http://lists.cypherpunks.ca/mailman/listinfo/otr-dev

Reply via email to