Ross Boylan [EMAIL PROTECTED] writes:
The recent security advisory for Debian's version of openssl says that
you should regenerate all keys, and that DSA keys should be considered
compromised.
Does this mean that RSA keys for openssh should not be considered
compromised? If so, why the
The recent security advisory for Debian's version of openssl says that
you should regenerate all keys, and that DSA keys should be considered
compromised.
Does this mean that RSA keys for openssh should not be considered
compromised? If so, why the need to regenerate them?
Thanks.
Ross Boylan
On May 13, 2:20 pm, Ross Boylan [EMAIL PROTECTED] wrote:
Does this mean that RSA keys for openssh should not be considered
compromised? If so, why the need to regenerate them?
On our systems the dowkd.pl script found weak DSA and RSA keys, both
as host keys, and as user-generated keypairs.
On Tue, May 13, 2008 at 7:05 PM, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
On May 13, 2:20 pm, Ross Boylan [EMAIL PROTECTED] wrote:
Does this mean that RSA keys for openssh should not be considered
compromised? If so, why the need to regenerate them?
On our systems the dowkd.pl script
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 05/13/08 19:36, Nelson Castillo wrote:
On Tue, May 13, 2008 at 7:05 PM, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
On May 13, 2:20 pm, Ross Boylan [EMAIL PROTECTED] wrote:
Does this mean that RSA keys for openssh should not be considered
5 matches
Mail list logo