Diffie Hellman and TLS with nonsense parameters

Hanno's Blog

Thursday, March 6. 2014

Diffie Hellman and TLS with nonsense parameters


Trackbacks

No Trackbacks

Comments
Display comments as (Linear | Threaded)

"The test with the Internet Explorer was a bit difficult because usually the Microsoft browser doesn't support Diffie Hellman key exchanges."

FWIW, it seems this was improved last week:

http://support.microsoft.com/kb/2929781

"This article describes an update in which new TLS cipher suites are added and cipher suite priorities are changed in Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2. All new cipher suites operate in Galois/counter mode (GCM), and two of them offer perfect forward secrecy (PFS) by using DHE key exchange together with RSA authentication."
#1 Karsten on 2014-04-16 21:13 (Reply)
the certificate for dh.tlsfun.de is expired...
#2 lily on 2015-05-15 00:22 (Reply)

Add Comment

E-Mail addresses will not be displayed and will only be used for E-Mail notifications.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA

 
 

About

This blog is written by Hanno Böck. Unless noted otherwise, its content is licensed as CC0.

You can find my web page with links to my work as a journalist here.

I am also publishing a newsletter about climate change and decarbonization technologies.

The blog uses the free software Serendipity and is hosted at schokokeks.org.

Hanno on Mastodon | Contact / Imprint | Privacy / Datenschutz