Proposed patch for mod_ssl

2008-02-20 Thread Erwann ABALEA
anything, and this CRL covers *all* the certificates (even the one signed by the old key) Discussion and comments are welcomed. -- Erwann ABALEA [EMAIL PROTECTED] apache2_2.2.6_crl_renewed_CA.diff.gz Description: Binary data

Re: CRL verification in mod_ssl

2008-10-19 Thread Erwann ABALEA
2008/10/15 Dr Stephen Henson [EMAIL PROTECTED]: Erwann ABALEA wrote: 2008/10/15 Dr Stephen Henson [EMAIL PROTECTED]: Dirk-Willem van Gulik wrote: On Aug 28, 2008, at 9:41 PM, Nicob wrote: [...] This issue does have some security implications. For example a revoked client certificate could

Re: CRL verification in mod_ssl

2008-10-20 Thread Erwann ABALEA
2008/10/20 Erwann ABALEA [EMAIL PROTECTED]: What is the decision criteria to reload a CRL? expiration of the notAfter date? An application based period would be better. s/notAfter/nextUpdate/ -- Erwann.

Re: Diffie-Hellman group parameters 1024 bit and Perfect Forward Secrecy

2013-06-28 Thread Erwann ABALEA
It could be done, yes. However, it's slightly less necessary, as right now prime256v1 curve is the default one, and it's a secure one (until Dan Bernstein publishes his paper about NIST curves). On high-volume websites, some may be tempted to switch to prime224v1 if it was possible; it's twice as

[PATCH 49559] Admin-supplied Diffie-Hellman parameters for DHE connections

2010-08-09 Thread Erwann ABALEA
Hello, I wrote and posted this patch several weeks ago, this is just a message to eventually open a discussion for its approval or rejection. -- Erwann ABALEA erwann.aba...@keynectis.com Département RD KEYNECTIS

Re: SSL related DoS

2011-04-16 Thread Erwann ABALEA
2011/4/16 Chris Hill chris.hill...@gmail.com: [...] SSL handshakes take more processing power in the server side than on the client side (some commented in the order of 15x more). This is great news for attackers who want to take down a site and the work has already be done for them through