Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20141006133945.GG9817@openstack.org>
Date: Mon, 6 Oct 2014 13:39:45 +0000
From: Jeremy Stanley <jeremy@...nstack.org>
To: oss-security@...ts.openwall.com
Subject: Re: OpenSSL RSA 1024 bits implementation broken?

On 2014-10-06 11:33:03 +0200 (+0200), Pierre Schweitzer wrote:
> There appear to have some noise on the Internet regarding a possible
> flaw in the 1024 bits RSA implementation in OpenSSL which would allow
> bruteforcing the private key in ~20 minutes.
> 
> Does anyone has any information about this? The associated pastebin to
> the said information is: http://pastebin.com/D8itq6Ff
> Is this serious?

It's been picked apart somewhat in a thread[1] on Perry Metzger's
moderated cryptography mailing list.

[1] http://www.metzdowd.com/pipermail/cryptography/2014-October/023142.html
-- 
Jeremy Stanley

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.