On Mon, Jun 30, 2014 at 1:56 AM, Kurt Roeckx <k...@roeckx.be> wrote:

> On 2014-06-30 02:35, Hubert Kario wrote:
>
>> The benefits of ECDHE outweigh the risks of using RC4,
>>>
>>
>> I have to disagree here. Even 1024 bit DHE requires a targeted attack at
>> ~80 bit
>> complexity. Currently we see RC4 at around 56 bit, with a completely
>> unoptimized
>> attack...
>>
>
> Do you have a reference for those 56 bit?  You're not talking about the
> old export ciphers I hope?  I haven't seen anything saying that the 128 bit
> RC4 has a complexity of 56 bit.  If it's really at 56 bit, we should
> disable it everywhere now, no matter if it breaks things or not.
>
> I think we should do all that's possible to avoid RC4.  I think that for
> now we should follow Microsoft in not having RC4 in the initial handshake
> and if fails retry with RC4 enabled.  It's my understanding that that
> should reduce RC4 usage from 20% of the sites to 1%.
>

I would welcome a patch that does that. I think initially we should do it
without disabling TLS_ECDHE_*_WITH_RC4_*, instead only disabling
TLS_RSA_WITH_RC4_*, so that we don't push sites that choose
TLS_ECDHE_*_WITH_RC4_* to using non-ephemeral key exchange. I think, in
parallel with that, we can figure out why so many sites are still using
TLS_ECDHE_*_WITH_RC4_* instead of TLS_ECDHE_*_WITH_AES* and start the
technical evangelism efforts to help them.

Cheers,
Brian
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to