Speedup of fixing an openssl bug with 8192 bit key [on hold]

Posted by rubo77 on Server Fault See other posts from Server Fault or by rubo77
Published on 2014-08-19T19:44:15Z Indexed on 2014/08/19 22:22 UTC
Read the original article Hit count: 162

Filed under:
|
|

This is related to this Bug-Report

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=747453

OpenSSL contains a set of arbitrary limitations on the size of accepted key parameters that make unrelated software fail to establish secure connections. The problem was found while debugging a XMPP s2s connection issue where two servers with long certificate keys (8192 Bit RSA) failed to establish a secure connection because OpenSSL rejected the handshake.

This seems to be a small problem to be fixed but although there is an easy patch available to fix the issue in that bug report, no reactions are noticed so far..

The last patch that broke the 2048 barrier took 2 years to be implemented and only resulted in an increase to 4096bit, which seems to be a bad joke.

Where would we have to report this to speed up the implementation for such an issue?

© Server Fault or respective owner

Related posts about openssl

Related posts about encryption