2008/5/14 Tzafrir Rehan <[EMAIL PROTECTED]>: > So apparently all keys were produced using the same random seed? > > That's simply mindblowing! >
No, but a finite set of random numbers were used to generate the seed. Basically, if you have two sufficiently similar machines you could create a key on one, examine it, and decode a key produced on the other. This is way over simplified, but it illustrates the point. Any machine using a key generated on an affected machine should be considered vulnerable. Not compromised, but vulnerable. Generate new keys (on slackware :)) and get switching. Dotan Cohen http://what-is-what.com http://gibberish.co.il א-ב-ג-ד-ה-ו-ז-ח-ט-י-ך-כ-ל-ם-מ-ן-נ-ס-ע-ף-פ-ץ-צ-ק-ר-ש-ת A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? _______________________________________________ Haifux mailing list [email protected] http://hamakor.org.il/cgi-bin/mailman/listinfo/haifux
