diff options
author | Dirk Wetter <dirk@testssl.sh> | 2015-06-22 13:50:27 +0200 |
---|---|---|
committer | Dirk Wetter <dirk@testssl.sh> | 2015-06-22 13:50:27 +0200 |
commit | e63375ecaa2eb6042c734b2ab0c1b1ddccfbdf5b (patch) | |
tree | 78a8fc0177465e2fc9773ee54ffae14a0404eb94 | |
parent | 9c82a57a1690435f4d1e0986c3a746d5b8e18642 (diff) | |
download | server-side-tls-e63375ecaa2eb6042c734b2ab0c1b1ddccfbdf5b.zip server-side-tls-e63375ecaa2eb6042c734b2ab0c1b1ddccfbdf5b.tar.gz server-side-tls-e63375ecaa2eb6042c734b2ab0c1b1ddccfbdf5b.tar.bz2 |
Typos (links)
-rw-r--r-- | Server_Side_TLS.mediawiki | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/Server_Side_TLS.mediawiki b/Server_Side_TLS.mediawiki index 6e7b79e..1c00ffd 100644 --- a/Server_Side_TLS.mediawiki +++ b/Server_Side_TLS.mediawiki @@ -269,7 +269,7 @@ MBYCEQCHU6UNZoHMF6bPtj21Hn/bAgEC..... </source> == Pre-defined DHE groups == -In order to lower the burden of system administrators, several servers provide pre-computed DH groups. Unfortunately, the [[https://weakdh.org|logjam] report showed that it is very likely that a state-level adversary may have broken the most widely used 1024-bit DH group, Oakley group 2, standardized in [[https://tools.ietf.org/html/rfc2409#section-6.2|rfc2409]]. +In order to lower the burden of system administrators, several servers provide pre-computed DH groups. Unfortunately, the [https://weakdh.org/ logjam] report showed that it is very likely that a state-level adversary may have broken the most widely used 1024-bit DH group, Oakley group 2, standardized in [https://tools.ietf.org/html/rfc2409#section-6.2 rfc2409]. For this reason, the use of this group is considered unsafe and you should either: * use a larger group, with a minimum size of 2048-bit, as recommended in the intermediate and modern configurations ; |