[openssl-users] Openssl software failure for RSA 16K modulus
Gupta, Saurabh
Saurabh.Gupta at cavium.com
Fri Jul 22 06:44:48 UTC 2016
1: I didn't get it, Why this behaviour is not coming for other ciphers while doing the server/client handshake?
It should fail for other ciphers also.
Ciphers: working
DHE-RSA-AES128-SHA
ECDHE-RSA-AES256-GCM-SHA384
...... etc
Ciphers: Not working
AES128-SHA
AES256-SHA
...... etc
Protocols:
tls1/tls1_1/tls1_2
2: if anyway I want to use 16k modulus, Do we have solution to avoid this issue so that it won't harm to other application or create any new attack?
3: ECC cipher is not my main concerned.
4: I didn't face any issue like memory utilisation or CPU utilisation is more if I'm running more than one client in the case of 16k modulus.
Regards,
Saurabh
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mta.openssl.org/pipermail/openssl-users/attachments/20160722/2ce87bce/attachment.html>
More information about the openssl-users
mailing list