Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 20 May 2015 22:02:39 +0200
From: Yves-Alexis Perez <corsac@...ian.org>
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: Re: CVE-2015-4000 - TLS does not properly convey
 server's ciphersuite choice

On mer., 2015-05-20 at 14:29 -0400, cve-assign@...re.org wrote:
> 1. Use of a common group obtained from a third party was not a
> choice that would have been anticipated to be unreasonable.
> 
> 2. Avoiding use of a common group is not really equivalent to
> correcting a software mistake; it could typically involve improving a
> software product by adding new functionality or documentation, such as
> adding a call to "openssl dhparam" at installation time.
> 
> 3. Existence of a common group across different customers' deployments
> of a product is not independently exploitable; there is no attack that
> depends exclusively on knowing the group used by a victim.

In some cases (IKEv2 for example), using different parameters is not
possible (or really unpractical): standards groups are defined in
RFC3526.
-- 
Yves-Alexis

Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.