-
Notifications
You must be signed in to change notification settings - Fork 29.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
remove smaller DH modp's #3406
Comments
Couple of questions:
|
Yeah, 1024 and 1536 are mentioned in the paper, so even though we've moved up to 1024 as a minimum we're still not at an ideal level, but thus is the compromise involved in choosing default parameters! I think it might be Java 7 based clients that are the biggest hurdle to moving beyond 1024 as a minimum and Java 7 is still in very wide use and not likely to disappear any time soon. This whole area is making me wonder if we shouldn't try a new approach to our crypto defaults. We are basically forced to select our settings and cipher suite based on lowest-common-denominator client capabilities while considering the whole Node.js ecosystem. However, many Node.js users are deploying to environments where their target clients are well above the minimum that we're considering. Therefore, perhaps we need to have at least two levels of crypto settings, a default and an ideal, maybe even an uber secure for those that can afford it (e.g. situations where they have full control over their clients and may even be doing Node.js <-> Node.js comms). I see two obvious ways of doing this:
/cc @nodejs/crypto |
So this is more specifically about well known primes then small primes but On Fri, Oct 16, 2015, 4:27 PM Brian White [email protected] wrote:
|
Java 7 supports ECDHE, so I don't think it's fatal that it cannot handle DH keys > 1024 bits. Java 6 OTOH would be in trouble. I have tested that using Qualys SSL Server Test. |
Do we know what other languages / frameworks do or are doing in the short term? My (admittedly limited) googling didn't really turn up anything. Removing the ability to use modp1 and modp2 by name seems reasonable at first glance. Alternatively, we can prefix them with /cc @nodejs/crypto - you should chime in here. |
Sorry to be late. I missed this. crypto module has a API of |
I'm +1 for prefix, or stderr warning on use. |
FWIW |
Is there reason to keep this open still? |
@jasnell IMHO I don't think so, a documentation update was committed awhile back. |
based on the recent paper on new attacks against diffie-hellman it might be a good idea to remove 2 of the well known primes that node comes with from the defaults, namely modp1 and modp2 aka Oakley Group 1 and 2 which are mentioned specifically in the linked paper as being vulnerable to pre computation attacks with academic and state level resources respectively.
The text was updated successfully, but these errors were encountered: