bpo-34399: 2048 bits RSA keys and DH params by tiran · Pull Request #8762 · python/cpython (original) (raw)

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Conversation10 Commits1 Checks0 Files changed

Conversation

This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.Learn more about bidirectional Unicode characters

[ Show hidden characters]({{ revealButtonHref }})

tiran

@tiran

NOTE: 2.7 and 3.6 need additional fixes from GH-5247

nmav

82:1e:06:47:02:7f:ac:fc:8b:5f:1a:14:c3:c0:ee:
28:81:d1:48:7d:78:f0:17:dc:c8:aa:ae:07:b7:39:
56:cb
generator: 2 (0x2)

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

one improvement towards future-compatibility could be to use standardized DH prime parameters e.g., from rfc7919. Thinking of future implementation change which could verify that the primes used come from a known set params.

@tiran

@nmav I have updated the DH test file to use RFC 7919 high FFDH parameters with 3072 bits.

@tiran

Downstream vendors have started to deprecate weak keys. Update all RSA keys and DH params to use at least 2048 bits.

Finite field DH param file use RFC 7919 values, generated with

certtool --get-dh-params --sec-param=high

Signed-off-by: Christian Heimes christian@python.org

@bedevere-bot

@tiran: Please replace # with GH- in the commit message next time. Thanks!

@miss-islington

Thanks @tiran for the PR 🌮🎉.. I'm working now to backport this PR to: 2.7, 3.6, 3.7.
🐍🍒⛏🤖

@tiran tiran deleted the bpo34399-key2048bits branch

August 14, 2018 10:54

@bedevere-bot

@miss-islington

Sorry, @tiran, I could not cleanly backport this to 3.6 due to a conflict.
Please backport using cherry_picker on command line.
cherry_picker 88bfd0bce05043f658e50addd21366f317995e35 3.6

@miss-islington

Sorry, @tiran, I could not cleanly backport this to 2.7 due to a conflict.
Please backport using cherry_picker on command line.
cherry_picker 88bfd0bce05043f658e50addd21366f317995e35 2.7

miss-islington pushed a commit to miss-islington/cpython that referenced this pull request

Aug 14, 2018

@tiran @miss-islington

Downstream vendors have started to deprecate weak keys. Update all RSA keys and DH params to use at least 2048 bits.

Finite field DH param file use RFC 7919 values, generated with

certtool --get-dh-params --sec-param=high

Signed-off-by: Christian Heimes christian@python.org (cherry picked from commit 88bfd0b)

Co-authored-by: Christian Heimes christian@python.org

@bedevere-bot

@bedevere-bot

tiran added a commit to tiran/cpython that referenced this pull request

Aug 14, 2018

@tiran

Downstream vendors have started to deprecate weak keys. Update all RSA keys and DH params to use at least 2048 bits.

Finite field DH param file use RFC 7919 values, generated with

certtool --get-dh-params --sec-param=high

Signed-off-by: Christian Heimes christian@python.org. (cherry picked from commit 88bfd0b)

Co-authored-by: Christian Heimes christian@python.org

tiran added a commit to tiran/cpython that referenced this pull request

Aug 14, 2018

@tiran

Downstream vendors have started to deprecate weak keys. Update all RSA keys and DH params to use at least 2048 bits.

Finite field DH param file use RFC 7919 values, generated with

certtool --get-dh-params --sec-param=high

Signed-off-by: Christian Heimes christian@python.org. (cherry picked from commit 88bfd0b)

Co-authored-by: Christian Heimes christian@python.org

tiran added a commit that referenced this pull request

Aug 14, 2018

@miss-islington @tiran

Downstream vendors have started to deprecate weak keys. Update all RSA keys and DH params to use at least 2048 bits.

Finite field DH param file use RFC 7919 values, generated with

certtool --get-dh-params --sec-param=high

Signed-off-by: Christian Heimes christian@python.org (cherry picked from commit 88bfd0b)

Co-authored-by: Christian Heimes christian@python.org

tiran added a commit that referenced this pull request

Aug 14, 2018

@tiran

Downstream vendors have started to deprecate weak keys. Update all RSA keys and DH params to use at least 2048 bits.

Finite field DH param file use RFC 7919 values, generated with

certtool --get-dh-params --sec-param=high

Signed-off-by: Christian Heimes christian@python.org. (cherry picked from commit 88bfd0b)

Co-authored-by: Christian Heimes christian@python.org

tiran added a commit that referenced this pull request

Aug 15, 2018

@tiran

Downstream vendors have started to deprecate weak keys. Update all RSA keys and DH params to use at least 2048 bits.

Finite field DH param file use RFC 7919 values, generated with

certtool --get-dh-params --sec-param=high

Signed-off-by: Christian Heimes christian@python.org. (cherry picked from commit 88bfd0b)

Co-authored-by: Christian Heimes christian@python.org

carljm added a commit to carljm/cpython that referenced this pull request

Aug 19, 2018

@carljm