Description of problem: Use at least 15360 bits group size for Discrete Logarithm Diffie-Hellman if you use a 256 bit block cipher. See various standards (especially NIST) cited at http://www.keylength.com/ This is not possible with openssl, because (see bug 1010607) "their crypto/dh/dh.h file has: #ifndef OPENSSL_DH_MAX_MODULUS_BITS # define OPENSSL_DH_MAX_MODULUS_BITS 10000 #endif" it should be 65536. Possibly, other changes need to be made to enable the use of such large groups. Version-Release number of selected component (if applicable): openssl-1.0.1e-39.fc21.i686
Please report this issue upstream. Note that computations with such large DH moduli are extremely slow and CPU cycle consuming so this means they are not too useful anyway.
(In reply to Tomas Mraz from comment #1) > Please report this issue upstream. Note that computations with such large DH > moduli are extremely slow and CPU cycle consuming so this means they are not > too useful anyway. This is incorrect, as noted already in bug 1010607. You may have these issues with ephemeral RSA keys, but they don't apply to discrete logarithm Diffie-Hellman. The only minor issue it has is the (moderate) amount of data transferred during key exchange.... Which is why elliptic curves are now preferred. But large Discrete Logarithm Diffie-Hellman group sizes should work anyway.
Anything new here? Has this been forwarded upstream?
This is request for a new upstream feature and it would be best handled within OpenSSL upstream. Please report it to OpenSSL project in: https://github.com/openssl/openssl/issues
Not sure what (or if something) has happened here regards taking this report to upstream, filed https://github.com/openssl/openssl/issues/2558 now.