2008/5/14 Tzafrir Rehan <[EMAIL PROTECTED]>:
> So apparently all keys were produced using the same random seed?
>
> That's simply mindblowing!
>

No, but a finite set of random numbers were used to generate the seed.
Basically, if you have two sufficiently similar machines you could
create a key on one, examine it, and decode a key produced on the
other. This is way over simplified, but it illustrates the point.

Any machine using a key generated on an affected machine should be
considered vulnerable. Not compromised, but vulnerable. Generate new
keys (on slackware :)) and get switching.

Dotan Cohen

http://what-is-what.com
http://gibberish.co.il
א-ב-ג-ד-ה-ו-ז-ח-ט-י-ך-כ-ל-ם-מ-ן-נ-ס-ע-ף-פ-ץ-צ-ק-ר-ש-ת

A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
_______________________________________________
Haifux mailing list
[email protected]
http://hamakor.org.il/cgi-bin/mailman/listinfo/haifux

Reply via email to