Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANO=Ty1Rp1m=qTr7Y+JGfFwAO3Q7nFwWdYGd6-Nb7N==DcZ-HA@mail.gmail.com>
Date: Wed, 20 Jan 2016 11:07:19 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: Daniel Kahn Gillmor <dkg@...thhorseman.net>
Cc: oss-security <oss-security@...ts.openwall.com>
Subject: Re: Prime example of a can of worms

On Wed, Jan 20, 2016 at 11:00 AM, Daniel Kahn Gillmor <dkg@...thhorseman.net
> wrote:

> On Wed 2016-01-20 12:25:42 -0500, Kurt Seifried wrote:
> > Sorry yes, although this also applies equally to keys/etc.
>
> sure, though i hope we're not in a "few keys" scenario, that would
> definitely be bad :)
>

Yes it would be bad:

https://blog.shodan.io/duplicate-ssh-keys-everywhere/

There was another analysis with even more worrying numbers but I can't find
it.


--
Kurt Seifried -- Red Hat -- Product Security -- Cloud
PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
Red Hat Product Security contact: secalert@...hat.com

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.