Do we really want to have the legacy provider as opt-in only?
Benjamin Kaduk
kaduk at mit.edu
Fri Jul 19 23:39:11 UTC 2019
On Tue, Jul 16, 2019 at 03:06:28PM -0400, Viktor Dukhovni wrote:
> On Mon, Jul 15, 2019 at 02:27:44PM +0000, Salz, Rich wrote:
>
> > >> DSA
> > >
> > > What is the cryptographic weakness of DSA that you are avoiding?
> >
> > It's a good question. I don't recall the specific reason why that was added to
> > the list. Perhaps others can comment.
> >
> > The only weakness I know about is that if you re-use the nonce, the private
> > key is leaked. It's more brittle than RSA-PKCS, but not as flawed as RC4.
> >
> > I think this should be removed from the "legacy" list unless someone can point out why it's like the others in the list.
>
[...]
> 4. As mentioned key disclosure is more likely than with RSA.
Huh, and it looks like we don't even implement deterministic DSA (RFC
6979) which is a partial mitigation.
-Ben
More information about the openssl-project
mailing list