Speedup of fixing an openssl bug with 8192 bit key [on hold]
Posted
by
rubo77
on Server Fault
See other posts from Server Fault
or by rubo77
Published on 2014-08-19T19:44:15Z
Indexed on
2014/08/19
22:22 UTC
Read the original article
Hit count: 162
This is related to this Bug-Report
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=747453
OpenSSL contains a set of arbitrary limitations on the size of accepted key parameters that make unrelated software fail to establish secure connections. The problem was found while debugging a XMPP s2s connection issue where two servers with long certificate keys (8192 Bit RSA) failed to establish a secure connection because OpenSSL rejected the handshake.
This seems to be a small problem to be fixed but although there is an easy patch available to fix the issue in that bug report, no reactions are noticed so far..
The last patch that broke the 2048 barrier took 2 years to be implemented and only resulted in an increase to 4096bit, which seems to be a bad joke.
Where would we have to report this to speed up the implementation for such an issue?
© Server Fault or respective owner