On Tue, May 13, 2008 at 11:39:54PM -0300, Henrique de Moraes Holschuh wrote: > On Wed, 14 May 2008, Nick Boyce wrote: > > This is the best explanation I've seen so far : > > http://it.slashdot.org/comments.pl?sid=551636&cid=23392602 > > > > I have no idea if it's correct, but it sounds very plausible. > > It is incorrect. Close, but incorrect. > > > If there was any mistake it may have been to try too hard to get a > > warning-free run from valgrind. > > Especially when dealing with a badly signaled landmine zone like OpenSSL... > > > As the /. post says, "Hats off to the reviewer who picked up on the > > problem". > > Indeed. Running millions of machines on what basically is a small set > of keys (in other words, brute-forceable) is no joke. We will be > feeling the repercusions of this one for a few years. > > It is probably worth a lot of effort to fully map the entire set of keys > the broken openssl could generate, and find a very fast way to check if > a key belong to that set. And add that to openssl upstream (to > automatically fail any verification done using such keys). >
So, just so I understand the possible issue here. The key generated with
the bad openssl library come from a smaller set of possible keys and a
brute force attack would take a lot less time than key generated from a
non broken openssl library ?
is that right ?
or is it that the keys generated from the bad openssl library can be
worked out (ie given the public you could compute the private)
Thanks
> --
> "One disk to rule them all, One disk to find them. One disk to bring
> them all and in the darkness grind them. In the Land of Redmond
> where the shadows lie." -- The Silicon Valley Tarot
> Henrique Holschuh
>
>
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
>
>
--
"There's been a act of war declared upon America by terrorists, and we will
respond accordingly."
- George W. Bush
09/15/2001
Camp David
signature.asc
Description: Digital signature

