disabledAlgorithms "DHE keySize < 1024" support?
Xuelei Fan
xuelei.fan at oracle.com
Sat May 23 14:16:16 UTC 2015
On 5/23/2015 9:50 PM, Bernd Eckenfels wrote:
> Am Sat, 23 May 2015 08:30:26 +0800
> schrieb Xuelei Fan <xuelei.fan at oracle.com>:
>
>> Please refer to the "Customizing Size of Ephemeral Diffie-Hellman
>> Keys" section of JSSE Reference Guide.
>>
>> http://docs.oracle.com/javase/8/docs/technotes/guides/security/jsse/JSSERefGuide.html
>
> Thanks Xulei, but I think this does not address the minimum accepted
> size of an client SSLSocket (at least I could not see that in the
> description). It only allows to configure the server generated groups
> in the ServerKeyExchange.
>
> When setting jdk.tls.ephemeralDHKeySize=2048 I still can connect to
> https://dhe512.zmap.io/
>
Right, it is impact the generation of DH keys.
I did not get your ideas in the previous mail.
"jdk.tls.disabledAlgorithms" is expected to work to disable weak DH keys
(for example, ""DHE keySize < 768"). Can you describe your concern more?
Thanks,
Xuelei
> Gruss
> Bernd
>
> BTW in Regards to the Server side:
>
> That document should mention that the parameter group is generated
> randomly on first use (matching DSA restrictions). It is a good thing
> there are no standard primes used, it would be better if they are
> constructed not specifically for DSA (as mentioned in the Logjam
> paper).
>
> I can imagine that in the future for higher security mutual agreed
> parameter groups become more important, so let me point to
> http://bugs.java.com/view_bug.do?bug_id=4641806 as well.
>
More information about the security-dev
mailing list