Re: [TLS] draft-sheffer-tls-bcp: DH recommendations

Yoav Nir <> Mon, 23 September 2013 05:22 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 531D811E8186 for <>; Sun, 22 Sep 2013 22:22:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -10.355
X-Spam-Status: No, score=-10.355 tagged_above=-999 required=5 tests=[AWL=0.244, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id q5W-qGbwBenn for <>; Sun, 22 Sep 2013 22:22:00 -0700 (PDT)
Received: from ( []) by (Postfix) with ESMTP id D3AB411E80D7 for <>; Sun, 22 Sep 2013 22:21:59 -0700 (PDT)
Received: from ([]) by (8.13.8/8.13.8) with ESMTP id r8N5Lr4a011397; Mon, 23 Sep 2013 08:21:54 +0300
X-CheckPoint: {523FCFF1-F-1B221DC2-1FFFF}
Received: from ([]) by ([]) with mapi id 14.02.0347.000; Mon, 23 Sep 2013 08:21:53 +0300
From: Yoav Nir <>
To: Patrick Pelletier <>
Thread-Topic: draft-sheffer-tls-bcp: DH recommendations
Thread-Index: AQHOuBaedQwzN3MPlUCJDzO8Os+PB5nSlycA
Date: Mon, 23 Sep 2013 05:21:53 +0000
Message-ID: <>
References: <> <> <> <> <> <>
In-Reply-To: <>
Accept-Language: en-US
Content-Language: en-US
x-originating-ip: []
x-kse-antivirus-interceptor-info: protection disabled
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "<>" <>
Subject: Re: [TLS] draft-sheffer-tls-bcp: DH recommendations
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Mon, 23 Sep 2013 05:22:05 -0000

On Sep 23, 2013, at 7:37 AM, Patrick Pelletier <> wrote:

> On 9/21/13 9:00 PM, Yoav Nir wrote:
>> There's also Apache, the most common web server on the web, that doesn't have configuration parameters for EDH key lengths, and tells OpenSSL to use 1024 bits.
> I view the Apache situation as an entirely different thing, since it's on the server side, rather than the client side, and the server is the one who gets to choose the parameters in the first place.  If the BCP says "you should configure your server to use 2048 bits" and the server only supports 1024 bits, then the sysadmin will just configure it to use 1024 bits, and we'll be no worse off than if the BCP had said to use 1024 bits.  The point is that this doesn't actually break anything.

Some people are suggesting that clients break the connection if offered a 1024-bit group. It does make sense that they would break the connection if offered, say, a 512-bit group, no?

> This is in contrast to the situation where the server picks 2048 bits, and the *client* only supports 1024 bits.  In that case, the handshake will fail.  So I see the Java (client side) issue as much worse than the Apache (server side) issue.
> Also, of course, this is easy to fix, since one can recompile Apache to support larger DH:
> (Hey, this isn't any worse than suggesting that everyone on Red Hat needs to recompile to get ECC support.)

No, it's different asking a vendor to change something vs asking end users to recompile Apache.

> It's also worth pointing out that technically this is an issue with mod_ssl, not with Apache itself.  You could always use mod_gnutls instead.

You can, but then hardly anyone does.