[openssl-users] Openssl software failure for RSA 16K modulus

Gupta, Saurabh Saurabh.Gupta at cavium.com
Fri Jul 22 06:44:48 UTC 2016


1: I didn't get it, Why this behaviour is not coming for other ciphers while doing the server/client handshake?

It should fail for other ciphers also.


Ciphers:  working

DHE-RSA-AES128-SHA
ECDHE-RSA-AES256-GCM-SHA384
...... etc

Ciphers: Not working
AES128-SHA
AES256-SHA
...... etc


Protocols:

tls1/tls1_1/tls1_2


2: if anyway I want to use 16k modulus, Do we have solution to avoid this issue so that it won't harm to other application or create any new attack?

3: ECC cipher is not my main concerned.

4: I didn't face any issue like memory utilisation or CPU utilisation is more if I'm running more than one client in the case of 16k modulus.

Regards,
Saurabh
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mta.openssl.org/pipermail/openssl-users/attachments/20160722/2ce87bce/attachment.html>


More information about the openssl-users mailing list