Speedup of fixing an openssl bug with 8192 bit key [on hold]
- by rubo77
This is related to this Bug-Report
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=747453
OpenSSL contains a set of arbitrary limitations on the size of
accepted key parameters that make unrelated software fail to establish
secure connections. The problem was found while debugging a XMPP s2s
connection issue where two servers with long certificate keys (8192
Bit RSA) failed to establish a secure connection because OpenSSL
rejected the handshake.
This seems to be a small problem to be fixed but although there is an easy patch available to fix the issue in that bug report, no reactions are noticed so far..
The last patch that broke the 2048 barrier took 2 years to be implemented and only resulted in an increase to 4096bit, which seems to be a bad joke.
Where would we have to report this to speed up the implementation for such an issue?