On Wed, 14 May 2008 07:59:58 +0200, Yves-Alexis Perez wrote:

> On mar, 2008-05-13 at 23:39 -0300, Henrique de Moraes Holschuh wrote:
>> 
>> It is probably worth a lot of effort to fully map the entire set of
>> keys
>> the broken openssl could generate, and find a very fast way to check if
>> a key belong to that set.  And add that to openssl upstream (to
>> automatically fail any verification done using such keys).
> 
> Ubuntu apparently made it. See http://www.ubuntu.com/usn/usn-612-2

Not quite... "Once the update is applied, weak user keys will be 
automatically rejected where possible (though they cannot be detected in 
all cases)."

I agree it would be neat if someone with a powerful machine could 
generate all possible keys. I don't know how long that would take 
however...

-- 
Sam Morris
http://robots.org.uk/
 
PGP key id 1024D/5EA01078
3412 EA18 1277 354B 991B  C869 B219 7FDB 5EA0 1078


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to