Hi,
The logjam attack on TLS has been around for a while [0], and I haven't
been paying attention to much of it (thanks for eyeballing it Peter).
The summary is that people with nation-state resources can precompute
what are essentially rainbow tables for cracking certain TLS key exchanges.
This isn't really something we have to be concerned with as we're hardly
a high value target. However, websites like SSL labs [1] have been
scoring sites lower if they're vulnerable to logjam. So, I put a little
attention in.
The fix is to generate our own prime for use in key exchanges. I've just
done that now on a home machine. It's baked into puppet and will be on
any dev VMs people deploy. As far as I'm aware, there are no real
security implications from this.
(The end; I figure no-one cares but I may as well point out that we're
covered).
[0]
https://weakdh.org/
[1]
https://www.ssllabs.com/ssltest/analyze.html?d=studentrobotics.org&latest
--
Thanks,
Jeremy