[16476] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: SSL/TLS passive sniffing

daemon@ATHENA.MIT.EDU (Ian Grigg)
Tue Nov 30 20:06:37 2004

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
In-Reply-To: <20041130192236.GD26086@randombit.net>
Date: Tue, 30 Nov 2004 15:32:35 -0500 (EST)
From: "Ian Grigg" <iang@systemics.com>
To: "Jack Lloyd" <lloyd@randombit.net>,
	"Victor Duchovni" <Victor.Duchovni@MorganStanley.com>
Cc: cryptography@metzdowd.com
Reply-To: iang@systemics.com

> On Tue, Nov 30, 2004 at 01:39:42PM -0500, Victor Duchovni wrote:
>> 8221    (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
>> 6529    (using TLSv1 with cipher EDH-RSA-DES-CBC3-SHA (168/168 bits))
...

(which I calculated as 98% DHE-xxx)

> "Jack Lloyd" wrote:
> Looking at my logs, about 95% of all STARTTLS connections are
> DHE-RSA-AES256-SHA;...


Great stats, guys!  Can either/both comment on what proportion
of connections you are seeing that use STARTTLS as opposed to
not using STARTTLS?

iang

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post