* Suresh Ramasubramanian:

> Possibly good crypto but extremely bad for interoperability, and obviously 
> ends
> up in a lot of email being sent out unencrypted / cleartext when at least a
> base level of TLS should have been available and usable.
>
> Setting tls_dh_min_bits=512 in remote_smtp does help mitigate it.

I suppose the simplest mitigation would be to avoid ephemeral
Diffie-Hellman key agreement altogether, that is, remove it from the
cipher suite default.

512 bits DH probably allows passive attacks, so IMHO it's unsuitable
even if the peer's certificate isn't validated in some way (because
like strong DH, this still provides security against passive
eavesdroppers).


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to