Loosely on topic, there is this recent blog entry from Twitter on what they did to implement Forward Security:

https://blog.twitter.com/2013/forward-secrecy-at-twitter-0

The main point seems to be that they dynamically rotate through SSL session keys and try to avoid storing them anywhere long-term.

They in turn cite:

Imperial Violet "How to botch TLS forward secrecy"

https://www.imperialviolet.org/2013/06/27/botchingpfs.html

_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to