Re: Unsecure use of DH-Cipher

2015-03-10 Thread Robert Paasche
sorry some mails dose not reach the list, i will add the information inline: 2015-03-10 18:23 GMT+01:00 Christopher Schultz : > Robert, > > On 3/10/15 12:16 PM, Robert Paasche wrote: > > The problem is, that openssl call the method "SSL_callback_tmp_DH" with > > keylen value of 512 or 1024. This

Re: Unsecure use of DH-Cipher

2015-03-10 Thread Christopher Schultz
Robert, On 3/10/15 12:16 PM, Robert Paasche wrote: > Explained code changes: > > Get the Privatekey: > pkey = SSL_get_privatekey(ssl); > type = pkey ? EVP_PKEY_type(pkey->type) : EVP_PKEY_NONE; > > if the encryption algorithem is either RSA or DSA we override the given > keylen parameter to

Re: Unsecure use of DH-Cipher

2015-03-10 Thread Robert Paasche
A DH Cipher of length 2048 bits uses a prime of 256 so even a private key of 8192 bits should match the requirements of java 7. Example: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x9f) DH 2048 bits (p: 256, g: 1, Ys: 256) p = prime Robert Paasche Senior Developer pripares GmbH Altheimer Eck 2 80

Re: Unsecure use of DH-Cipher

2015-03-10 Thread Rainer Jung
Am 10.03.2015 um 17:36 schrieb Rainer Jung: Am 10.03.2015 um 17:16 schrieb Robert Paasche: Hi guys, as requested by chris some explanation to the problem. The problem is, that openssl call the method "SSL_callback_tmp_DH" with keylen value of 512 or 1024. This cause that the cipher of the ssl

Re: Unsecure use of DH-Cipher

2015-03-10 Thread Rainer Jung
Am 10.03.2015 um 17:16 schrieb Robert Paasche: Hi guys, as requested by chris some explanation to the problem. The problem is, that openssl call the method "SSL_callback_tmp_DH" with keylen value of 512 or 1024. This cause that the cipher of the ssl handshake (key exchange) for a ssl-connectio