Ian Jackson <ijackson <at> chiark.greenend.org.uk> writes: > > Curiously, the optional ephemeral Diffie-Hellman part of the TLS > > protocol runs in plaintext, which means that it can be attacked > > directly, without bothering to attack the RSA part. As a result, that
> I diagree. Forward secrecy is generally an important improvement. Only if it provides secrecy. If one of the communication partners (say, the client, because it’s on a mobile) uses a guessable secret (say, due to lack of entropy), the session is lost. IMHO TLS should be changed to encrypt the DHE part (possibly with an anon RSA key on the client side (which may be short- or medium- lived) plus the server RSA key, *and* each party should send some entropy to the other party before DHE kex happens (which the other side may/should stir into their own RNG). Of course, using a medium-lived RSA key for _that_ on the server side (say, one regenerated every week) will provide additional secrecy, as it can’t be forced out even by LEOs if it no longer exists (has been properly purged after the week). But looking at the sad state in SChannel… no chance. Florian, what about switching to sign-only RSA server certs and letting the server use ephemeral RSA encryption keypairs for the actual session? Haven’t thought too long on that yet. (Probably even slower, but then we’ve at least got an established slider between fast and secure.) bye, //mirabilos, who wanted to write this up weeks ago and never got around to do so -- To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/loom.20130917t145055-...@post.gmane.org