[4981] in cryptography@c2.net mail archive
Re: so why is IETF stilling adding DES to protocols? (Re: It's official... DES is History)
daemon@ATHENA.MIT.EDU (Lucky Green)
Fri Jun 25 19:13:11 1999
Date: Fri, 25 Jun 1999 21:46:01 +0200 (CEST)
From: Lucky Green <shamrock@cypherpunks.to>
To: "Jeffrey I. Schiller" <jis@mit.edu>
Cc: Ben Laurie <ben@algroup.co.uk>, Adam Back <aba@dcs.ex.ac.uk>,
cryptography@c2.net, cypherpunks@cyberpass.net, mleech@nortel.ca
In-Reply-To: <37739267.727CE133@mit.edu>
OpenSSL is a library. It should support whatever the standard supports and
whatever users and/or authors of the lib desire to be in the lib. That may
include broken or null-ciphers. But the user should have to take positive
action to get at the broken ciphers. I believe by default, OpenSSL should
ship with the weak ciphers disabled. And there should be a clear warning:
"Not secure, don't fool yourself, do not use, etc]".
Offering ROT-13 in a library you one maintains is one thing. Making broken
crypto an Internet security standard is another matter entirely. Doing so
is bad engineering, bad for the Internet as a whole, and ultimately worse
for security purposes than no crypto at all. (Reader: see other posts on
this topic if the last statement doesn't make sense to you).
--Lucky
On Fri, 25 Jun 1999, Jeffrey I. Schiller wrote:
>
> Ben Laurie wrote:
>
> > OpenSSL has them disabled by default. But I am torn on this question:
> > these new ciphersuites give greater strength than existing ones when
> > interopping with export stuff. Is it sensible to refuse to add stronger
> > ciphersuites? If it isn't, because they are crap, should we (the OpenSSL
> > team) disable _all_ export ciphersuites?
>
> Speaking as a user of OpenSSL... Today I can accept RC4-40 connection on my
> servers from export browsers.
-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.