Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAAWYm=tnJaV03oKNbecerd6XWbxBgfb6SfCvQC6XouyrBTV-Pw@mail.gmail.com>
Date: Mon, 6 Oct 2014 12:06:55 -0400
From: David White <dmwhite823@...il.com>
To: oss-security@...ts.openwall.com
Subject: Re: OpenSSL RSA 1024 bits implementation broken?

I also perused the discussion at
http://www.reddit.com/r/crypto/comments/2i9qke/openssl_bug_allows_rsa_1024_key_factorization_in/,
which I found by googling this email subject.

Most folks there are saying that this isn't true.

On Mon, Oct 6, 2014 at 10:38 AM, Jeremy Stanley <fungi@...goth.org> wrote:

> On 2014-10-06 16:34:29 +0200 (+0200), Pierre Schweitzer wrote:
> > Following the information on that ML it appears not to be true. Or
> > at least, there's no obvious evidence it happened. And lack of
> > appropriate communication from reporter doesn't help getting rid
> > of doubts. Unless I missed something from the thread you pointed?
>
> That's been the impression I got so far, but I have a reply on the
> thread pending moderator approval linking to the blog post (which
> seems not to have been mentioned there yet).
> --
> Jeremy Stanley
>



-- 
David White
Founder & CEO

*Develop CENTS *
Computing, Equipping, Networking, Training & Supporting
Organizations Worldwide
http://developcents.com

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.