On Thu, 15 May 2008, Steinar H. Gunderson wrote:

> On Wed, May 14, 2008 at 06:22:37PM -0500, Steve Greenland wrote:
> >> Therefore, anyone who had a DSA key has had it compromised...
> > Shouldn't that be "anyone who had a DSA key *created by the flawed
> > version of openssl* has had it compromised..."? Or are you asserting
> > something stronger?
> 
> No. Any key who had a single DSA signature created by the flawed version of
> OpenSSL should be considered compromised. DSA requires a secret, random
> number as part of the signature process; if someone figures it out, or you
> use the same number twice, the entire secret key falls.

If I understand correctly, it means that if you use a good key with a
flawed openssl to connect to an other host using that key, then that
key can be considered compromised.

But what about using a good key on a host with a good openssl, to
connect to a server which use a bad openssl ?

regards,
Nicolas


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to