Fedor Brunner
2013-11-17 22:36:34 UTC
Hi,
Please increase the size of Diffie-Hellman parameters in
http://www.postfix.org/TLS_README.html
You recommend 1024 bit DH parameters, but for long term protection,
these parameters are too short.
During ephemeral Diffie-Hellman (EDH) key exchange a temporary key is
generated from DH parameters. This temporary key is used for encryption
of the communication and the server public RSA key is used ONLY for
signing of this temporary key and NOT for encryption of the
communication. If you use DH parameters shorter than you RSA key, you
are weakening your encryption.
https://wiki.openssl.org/index.php/Diffie_Hellman
https://wiki.openssl.org/index.php/Diffie-Hellman_parameters
If you are interested in more technical information about key sizes I
highly recommend:
http://www.keylength.com/en/compare/
Yearly Report on Algorithms and Keysizes (2012), D.SPA.20 Rev. 1.0,
ICT-2007-216676 ECRYPT II, 09/2012.
Recommendation for Key Management, Special Publication 800-57 Part 1
Rev. 3, NIST, 07/2012
Please increase the size of Diffie-Hellman parameters in
http://www.postfix.org/TLS_README.html
You recommend 1024 bit DH parameters, but for long term protection,
these parameters are too short.
During ephemeral Diffie-Hellman (EDH) key exchange a temporary key is
generated from DH parameters. This temporary key is used for encryption
of the communication and the server public RSA key is used ONLY for
signing of this temporary key and NOT for encryption of the
communication. If you use DH parameters shorter than you RSA key, you
are weakening your encryption.
https://wiki.openssl.org/index.php/Diffie_Hellman
https://wiki.openssl.org/index.php/Diffie-Hellman_parameters
If you are interested in more technical information about key sizes I
highly recommend:
http://www.keylength.com/en/compare/
Yearly Report on Algorithms and Keysizes (2012), D.SPA.20 Rev. 1.0,
ICT-2007-216676 ECRYPT II, 09/2012.
Recommendation for Key Management, Special Publication 800-57 Part 1
Rev. 3, NIST, 07/2012