On Fri, 2008-05-16 at 11:09 +0300, Shachar Shemesh wrote:
> I'll try to give context to Amos's message, as I think it is important.
>
> If you are running an ssh server on a machine which is not Debian, and
> was never affected by the openssl key generation bug, you may be under
> the impression that there is no need to do anything. This is not exactly
> the case.
One more piece of context which I feel to be necessary:
Does the vulnerability affect also PGP/GPG keys generated during the
last two years?
If yes, how to invalidate those keys when they are already at large?
--- Omer
--
"Kosher" Cellphones (cellphones with blocked SMS, video and Internet)
are menace to the deaf. They must be outlawed!
(See also:
http://www.zak.co.il/tddpirate/2006/04/21/the-grave-danger-to-the-deaf-from-kosher-cellphones/)
My own blog is at http://www.zak.co.il/tddpirate/
My opinions, as expressed in this E-mail message, are mine alone.
They do not represent the official policy of any organization with which
I may be affiliated in any way.
WARNING TO SPAMMERS: at http://www.zak.co.il/spamwarning.html
=================================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]