summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDirk Wetter <dirk@testssl.sh>2015-06-22 13:50:27 +0200
committerDirk Wetter <dirk@testssl.sh>2015-06-22 13:50:27 +0200
commite63375ecaa2eb6042c734b2ab0c1b1ddccfbdf5b (patch)
tree78a8fc0177465e2fc9773ee54ffae14a0404eb94
parent9c82a57a1690435f4d1e0986c3a746d5b8e18642 (diff)
downloadserver-side-tls-e63375ecaa2eb6042c734b2ab0c1b1ddccfbdf5b.zip
server-side-tls-e63375ecaa2eb6042c734b2ab0c1b1ddccfbdf5b.tar.gz
server-side-tls-e63375ecaa2eb6042c734b2ab0c1b1ddccfbdf5b.tar.bz2
Typos (links)
-rw-r--r--Server_Side_TLS.mediawiki2
1 files changed, 1 insertions, 1 deletions
diff --git a/Server_Side_TLS.mediawiki b/Server_Side_TLS.mediawiki
index 6e7b79e..1c00ffd 100644
--- a/Server_Side_TLS.mediawiki
+++ b/Server_Side_TLS.mediawiki
@@ -269,7 +269,7 @@ MBYCEQCHU6UNZoHMF6bPtj21Hn/bAgEC.....
</source>
== Pre-defined DHE groups ==
-In order to lower the burden of system administrators, several servers provide pre-computed DH groups. Unfortunately, the [[https://weakdh.org|logjam] report showed that it is very likely that a state-level adversary may have broken the most widely used 1024-bit DH group, Oakley group 2, standardized in [[https://tools.ietf.org/html/rfc2409#section-6.2|rfc2409]].
+In order to lower the burden of system administrators, several servers provide pre-computed DH groups. Unfortunately, the [https://weakdh.org/ logjam] report showed that it is very likely that a state-level adversary may have broken the most widely used 1024-bit DH group, Oakley group 2, standardized in [https://tools.ietf.org/html/rfc2409#section-6.2 rfc2409].
For this reason, the use of this group is considered unsafe and you should either:
* use a larger group, with a minimum size of 2048-bit, as recommended in the intermediate and modern configurations ;