Hi!

>  --- rsaglue.c   Wed Jan 17 11:42:52 2001
> +++ rsaglue.c   Tue Feb 13 16:05:33 2001
> @@ -264,8 +264,10 @@
>    mpz_clear(&aux);
>
>    if (value[0] != 0 || value[1] != 2)
> +  {
> +    kill(getppid(),SIGALRM);
>      fatal("Bad result from rsa_private_decrypt");
> -
> +  }
>    for (i = 2; i < len && value[i]; i++)
>      ;
>
> --- sshd.c      Wed Jan 17 11:42:53 2001
> +++ sshd.c      Tue Feb 13 16:05:15 2001
> @@ -757,9 +757,11 @@
>
>  RETSIGTYPE key_regeneration_alarm(int sig)
>  {
> +  static time_t last_keygen_time=0;
>    /* Check if we should generate a new key. */
> -  if (key_used)
> -    {
> +  if (key_used &&  (time(NULL) - last_keygen_time > 60))
> +   {
> +      last_keygen_time = time(NULL);
>        /* This should really be done in the background. */
>        log_msg("Generating new %d bit RSA key.", options.server_key_bits);
>
> random_acquire_light_environmental_noise(&sensitive_data.random_state);

This is still not good.

You changed time from hour to minute+time it takes for signal to be
delivered. That only means faster server is needed for this to be
exploitable.
                                                                Pavel
--
I'm [EMAIL PROTECTED] "In my country we have almost anarchy and I don't care."
Panos Katsaloulis describing me w.r.t. patents at [EMAIL PROTECTED]

Reply via email to