- Sep 15, 2008
- 5,056
- 199
- 116
Those links are amazing tools, thank you! I was only worried because of mandatory PCI compliance probes at an office.All versions of TLS protocol are affected. The attack depends on the server and client supporting weak EDH/DHE key exchanges, using typically 512-bit primes that are common among large amounts of servers (occurs when servers use pre-defined primes instead of generating their own).
TLS Logjam check will tell you if a server is vulnerable. Weakdh.org will tell you if your browser is vulnerable, in addition to explaining the vulnerability.
All versions of TLS protocol are affected. The attack depends on the server and client supporting weak EDH/DHE key exchanges, using typically 512-bit primes that are common among large amounts of servers (occurs when servers use pre-defined primes instead of generating their own).
TLS Logjam check will tell you if a server is vulnerable. Weakdh.org will tell you if your browser is vulnerable, in addition to explaining the vulnerability.
