On 02/06/2014 8:52 AM, Michael Tremer wrote:
<snip>
- Briefly(!) explain the algorithms there are and point out advantages
and disadvantages. Of course can never give advice to use exactly this algorithm, but we can say which are considered unsafe to use.
<snip>
Michael,
This isn't documentation-related, but is relevant tot he subject you brought up. Perhaps it would be worthwhile to change the user interface to add an element that requires a user to "Enable insecure encryption methods" before using protocols that are considered weak?
That way a user could still use those methods if required for interoperability, but it would be clear that it is not recommended for security reasons.
Tom