Change minimum DH size from 768 to 1024
authorKurt Roeckx <kurt@roeckx.be>
Sun, 10 Jan 2016 12:55:08 +0000 (13:55 +0100)
committerKurt Roeckx <kurt@roeckx.be>
Sun, 10 Jan 2016 23:01:52 +0000 (00:01 +0100)
Reviewed-by: Viktor Dukhovni <openssl-users@dukhovni.org>
CHANGES
ssl/s3_clnt.c

diff --git a/CHANGES b/CHANGES
index 32bd5c59587be51f6bc12a2b481a4eaf0e71c19f..e03c46f921edc35fed6425f1c89037ead88a9b3d 100644 (file)
--- a/CHANGES
+++ b/CHANGES
@@ -4,7 +4,8 @@
 
  Changes between 1.0.2e and 1.0.2f [xx XXX xxxx]
 
-  *)
+  *) Reject DH handshakes with parameters shorter than 1024 bits.
+     [Kurt Roeckx]
 
  Changes between 1.0.2d and 1.0.2e [3 Dec 2015]
 
index 8cbf46ad2ffa9f776faee3da687df4a307da63fc..04cc9f54a92dff51ba1ec263117c8b702430ca87 100644 (file)
@@ -3610,7 +3610,7 @@ int ssl3_check_cert_and_algorithm(SSL *s)
             DH_free(dh_srvr);
         }
 
-        if ((!SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) && dh_size < 768)
+        if ((!SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) && dh_size < 1024)
             || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) && dh_size < 512)) {
             SSLerr(SSL_F_SSL3_CHECK_CERT_AND_ALGORITHM, SSL_R_DH_KEY_TOO_SMALL);
             goto f_err;