On Sun, Dec 28, 2014 at 11:40:02PM +0000, Gregory Maxwell wrote: > http://www.spiegel.de/media/media-35552.pdf > > >From > >http://www.spiegel.de/international/world/nsa-documents-attacks-on-vpn-ssl-tls-ssh-tor-a-1010525.html > > The fact that they appear to have decrypted some but not all messages > in a log suggests to me that this is not a host compromise, or an > MITM. But potentially an attack on 1024 bit DH or AES-CTR?
OTR uses 1536-bit DH, not 1024-bit DH. It's possible the transcript on the second page of that PDF shows protocol messages (OTR Query, key exchange, etc.) messages. But I don't have a similar explanation for the ones after the undecryptable OTR messages on the first page. - Ian _______________________________________________ OTR-dev mailing list OTR-dev@lists.cypherpunks.ca http://lists.cypherpunks.ca/mailman/listinfo/otr-dev