About 50 results
Open links in new tab
  1. What is Logjam and how do I prevent it? - Information Security Stack ...

    May 20, 2015 · I heard there is a "new" TLS vulnerability named Logjam, what does it do and how do I prevent it?

  2. Command to check a website is vulnerable to Logjam

    May 20, 2015 · First off, Logjam only applies to 'classic' aka integer aka modp aka Zp DH (E), not ever ECDH (E). Second, you were apparently using OpenSSL 1.1.1 which supports TLS1.3 -- which …

  3. tls - How to check if a server is not vulnerable to Logjam ...

    May 21, 2015 · In response to Logjam I want to prove I've hardened my services. I know that the DH param has to be 2048 bits at least and self generated. But I am unable to find a way to actually …

  4. tls - Does the recommended course of action for preventing Logjam on ...

    May 22, 2015 · Does the recommended course of action for preventing Logjam on Tomcat servers really eliminate all risks of weak DH keys? Ask Question Asked 10 years, 7 months ago Modified 10 years, …

  5. What are the OpenSSL standard Diffie-Hellman parameters (primes)?

    Jun 15, 2015 · I recently generated some custom Diffie-Hellman parameters which are basically just long (in the below case 4096 bit) primes. Those are then used in the key exchange process. I used the …

  6. Why is logjam rated as "None" for confidentiality impact in CVSS?

    But the description at Logjam notes " there is a passive network adversary able to eavesdrop " for Attack 1, and has a video displaying the plaintext of a post to an FBI site. Surely that merits at least a partial …

  7. LogJam hardening OpenSSH and testing it [duplicate]

    LogJam hardening OpenSSH and testing it [duplicate] Ask Question Asked 10 years, 6 months ago Modified 10 years, 1 month ago

  8. How 'Logjam' attack affects openID since it uses Diffie-Hellman key ...

    May 21, 2015 · According to the Diffie-Hellman key exchange get affected by logjam, and openID uses this to establish an association. So how this going to affect OpenID?

  9. Logjam definition question - Information Security Stack Exchange

    Jul 4, 2017 · In Logjam attack, the client presents a list of cipher suites (includes some strong cipher and EXPORT cipher as well). A Man-in-the-Middle attack will change this request such that highest grade …

  10. How can a RSA-2048 certificate be vulnerable to logjam attack?

    Feb 1, 2016 · Most likely I am missing some fundamentals: Our web servers are secured with TLS encryption. We use RSA-2048 bit certificates. The logjam attack targets the DH algorithm. How can …