FYI,

https://duhkattack.com/

Who is vulnerable?
Traffic from any VPN using FortiOS 4.3.0 to FortiOS 4.3.18 can be decrypted by 
a passive network adversary who can observe the encrypted handshake traffic. 
Other key recovery attacks on different protocols may also be possible. 
We also found eleven other historically FIPS-certified implementations that 
document hard-coded X9.31 RNG seed keys in their products. We give the full 
list in our paper.



Sent from my iPhone
_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan

Reply via email to