Currently, dovecot generates two primes for Diffie-Hellman key exchanges: a 512-bit one and a 1024-bit one. In light of recent events, I think it would be wise to add support for 2048-bit primes as well, or even better, add a configuration option that lets the user select a file (or files) containing the DH parameters In recent years, there has been increased interest in DH especially in its ephemeral version (DHE) because it provides perfect forward secrecy. In that context, the use of 1024-bit parameters might not seem such a terrible idea: if someone cracks the ephemeral key then they will only gain access to the data exchanged during that particular session. Therefore, it might not be worth the effort to crack such a key. But this is certainly not the case for IMAPS: it is quite likely that the session data will include the user's credentials.
Am 24.09.2013 08:48, schrieb Marios Titas:> Currently, dovecot generates two primes for Diffie-Hellman key > exchanges: a 512-bit one and a 1024-bit one. In light of recent > events, I think it would be wise to add support for 2048-bit primes as > well, or even better, add a configuration option that lets the user > select a file (or files) containing the DH parameters > > In recent years, there has been increased interest in DH especially in > its ephemeral version (DHE) because it provides perfect forward > secrecy. In that context, the use of 1024-bit parameters might not > seem such a terrible idea: if someone cracks the ephemeral key then > they will only gain access to the data exchanged during that > particular session. Therefore, it might not be worth the effort to > crack such a key. But this is certainly not the case for IMAPS: it is > quite likely that the session data will include the user's > credentials. >you may get problems with older mail clients , on smtp side i discovered i.e netscape 7 ist not able to handle stuff bigger then 1024 but some more configure options maybe fine ever Best Regards MfG Robert Schetterer -- [*] sys4 AG http://sys4.de, +49 (89) 30 90 46 64 Franziskanerstra?e 15, 81669 M?nchen Sitz der Gesellschaft: M?nchen, Amtsgericht M?nchen: HRB 199263 Vorstand: Patrick Ben Koetter, Axel von der Ohe, Marc Schiffbauer Aufsichtsratsvorsitzender: Florian Kirstein
On 9/24/2013 1:48 AM, Marios Titas wrote:> Currently, dovecot generates two primes for Diffie-Hellman key > exchanges: a 512-bit one and a 1024-bit one. In light of recent > events, I think it would be wise to add support for 2048-bit primes as > well...Why play incremental tiddly-winks with the NSA? Go straight to 1048576 bit encryption. That'll surely keep them out. Oh, wait, all of your email leaves and arrives via public SMTP, which nobody encrypts... NSA doesn't sniff the wire. They don't crack encryption. Neither are cost effective. They go straight to the source, intimidating the service provider into giving them the data, unencrypted. Or they don't get the data at all. So how does greater encryption help anyone "in light of recent events"? -- Stan
On 24/09/2013 07:48, Marios Titas wrote:> Currently, dovecot generates two primes for Diffie-Hellman key > exchanges: a 512-bit one and a 1024-bit one. In light of recent > events, I think it would be wise to add support for 2048-bit primes as > well, or even better, add a configuration option that lets the user > select a file (or files) containing the DH parameters > > [snip] > the case for IMAPS: it is > quite likely that the session data will include the user's > credentials.Thank you for suggesting this and, in light of the discussion that has resulted from your post, may I describe our use-case in the hope it might help shed light on why this could be worthwhile? Most of our work is subject to various non-disclosure obligations, and our staff work around the world, on short assignments of a few days, maybe a week or so, in countries who have various approaches and cultures in respect of confidentiality. It is vital for us that remote access to our mail server does not leak the user logons, because then all previous (and future) mail could be read by strangers in that country, and indeed by strangers in any country onto which our logon credentials were passed. To leak a private message is one thing, but to leak the whole mailboxes of all projects is something else completely. Additionally, if mail user names are also system logins, the problem becomes even more serious. Blackberry (in its Enterprise configuration) was thought to solve this use-case, though I've never known what cryptographic techniques RIM employ and, in any case, RIM has come under significant pressure from several countries and, we suspect, may no longer remain secure. We'd prefer to employ strong Open Source components. Though counter-party email travels in the clear over SMTP, we'd prefer that outbound email from staff (on assignment overseas) is sent from outbound mail servers in our own country (submitting via TLS, though not part of Dovecot, of course), and we'd prefer that inbound email, to the staff's MUA, is not sent in clear while they are on assignment. Using IMAPS we can ensure that mail -> MUA is always encrypted. A recent post on the OpenSSL list http://www.mail-archive.com/openssl-users at openssl.org/msg71899.html reveals that TLS evolution is being actively discussed with a view to using stronger cryptography, and that OpenSSL and GNUTLS are divergent at the moment (something I hadn't realised). Within that exchange of views, the problem of assuring end-to-end strong security, due to use of older or non-compliant components, is mentioned but (sometimes) wrongly, in my view, as a reason not to make improvements (yet). The (quite genuine) problem of end-to-end consistency can be solved, we feel, if each component is upgraded, so that sysadmins or end-users can select compatible building-blocks, including MUAs, when implementing their organisation's mail systems. I support the OP's suggestion. Could the Dovecot developer(s) consider adding support for longer key sizes? I'd like to ask a further related question, is it possible to run Dovecot with GNUTLS instead of OpenSSL? Even if it is not possible, I would still support the inclusion of more DH parameters so that Dovecot is 'OpenSSL ready' when OpenSSL does adopt stronger cipher or protocol choices. I can sort out what MUAs we use, or move to. regards, Ron
Seemingly Similar Threads
- Diffie Hellman key exchange algorithms
- Can we disable diffie-hellman-group-exchange-sha1 by default?
- diffie-hellman-group-exchange-sha256 group size concerns and request
- Can we disable diffie-hellman-group-exchange-sha1 by default?
- Can we disable diffie-hellman-group-exchange-sha1 by default?