via http://sebsauvage.net/links/?f8tYhQ
voir toute la partie sécurité, et tout le site semble digne d'intérêt
Riseup provides online communication tools for people and groups working on liberatory social change. We are a project to create democratic alternatives and practice self-determination by controlling our own secure means of communications.
C’est une nouvelle vulnérabilité touchant le protocole TLS qui vient de faire son apparition. Baptisée LogJam, elle touche les connexions chiffrées via l’algorithme Diffie-Hellman.
source en anglais
The Logjam attack https://weakdh.org/
Guide to Deploying Diffie-Hellman for TLS https://weakdh.org/sysadmin.html (recommendations pour serveurs)
Increasing the minimum TLS DH group size to 1024 bits https://groups.google.com/a/chromium.org/forum/#!topic/security-dev/WyGIpevBV1s
décortiquer une clef ssh privée, et conversion en PKCS8
http://www.theregister.co.uk/2014/10/14/nasty_ssl_30_vulnerability_to_drop_tomorrow/
http://www.theregister.co.uk/2014/10/14/google_drops_ssl_30_poodle_vulnerability/
https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
test: https://www.poodletest.com/
better test: https://dev.ssllabs.com
http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566
https://wiki.mozilla.org/Talk:Security/Server_Side_TLS