|
Message-ID: <20141006133945.GG9817@openstack.org> Date: Mon, 6 Oct 2014 13:39:45 +0000 From: Jeremy Stanley <jeremy@...nstack.org> To: oss-security@...ts.openwall.com Subject: Re: OpenSSL RSA 1024 bits implementation broken? On 2014-10-06 11:33:03 +0200 (+0200), Pierre Schweitzer wrote: > There appear to have some noise on the Internet regarding a possible > flaw in the 1024 bits RSA implementation in OpenSSL which would allow > bruteforcing the private key in ~20 minutes. > > Does anyone has any information about this? The associated pastebin to > the said information is: http://pastebin.com/D8itq6Ff > Is this serious? It's been picked apart somewhat in a thread[1] on Perry Metzger's moderated cryptography mailing list. [1] http://www.metzdowd.com/pipermail/cryptography/2014-October/023142.html -- Jeremy Stanley
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.