Hello,

Am Dienstag, 13. Mai 2008 schrieb Corey Hickey:
> Jan Luehr wrote:
> > Hello,
> >
> > Am Dienstag, 13. Mai 2008 schrieb Vincent Bernat:
> >> OoO En ce  début d'après-midi nuageux du mardi 13  mai 2008, vers 14:06,
> >>
> >> Florian Weimer <[EMAIL PROTECTED]> disait:
> >>> Package        : openssl
> >>> Vulnerability : predictable random number generator
> >>
> >> Some other random questions:
> >>  - It seems  that firefox does not handle  CRL unless manually imported,
> >>    correct? This  means that in  most cases already  issued certificates
> >>    are still  vulnerable even revoked. A  quick look seems  to show that
> >>    most software do not handle CRL at all.
> >>  - As a  maintainer of a package that  have generated certificates using
> >>    OpenSSL, how should we handle the issue?
> >>
> >> For the last question, I see several solutions:
> >>  - the user has to read the DSA and handle it himself
> >
> > Since some keys are generated automatically, (e.g. ssh host keys) users
> > will have to regenerate keys,they haven't generated in the first place
> > and might not be aware of their existens.
> > That's bad.
>
> Unless I'm gravely mistaken, SSH keys aren't affected by this
> vulnerability. OpenSSH and OpenSSL are separate, and your ssh program
> generated its own keys.

As stated in the DSA:
»Affected keys include SSH keys, OpenVPN keys, DNSSEC keys, and key
material for use in X.509 certificates and session keys used in SSL/TLS
connections.  Keys generated with GnuPG or GNUTLS are not affected,
though.«

Keep smiling
yanosz


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to