On Thu, Jul 26, 2001 at 10:44:54AM -0500, David Gadbois wrote:
> The changelog for OpenSSL 0.9.6-9 indicates that there were updates to
> the random number generator.  Should I replace static host keys
> generated with ssh-keygen?  Or does the change only impact session keys?

The bug allows an attacker, through a particular pattern of usage, to
determine the internal state of the PRNG.  With that information, it's
possible to reliably predict which data it will generate later.

I don't think you can do that if you generated the key with ssh-keygen,
since the process that generated it, and the PRNG instance it was using,
are both long gone.

But then, I'm not an expert, but the OpenSSL group's advisory says this:

 It is unlikely for applications to request PRNG bytes in a pattern
 allowing for the attack against the OpenSSL PRNG.  Typically,
 applications will request PRNG bytes in larger chunks.
 No applications is known to us which is actually vulnerable.

Cheers,

Nalin



_______________________________________________
Seawolf-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/seawolf-list

Reply via email to