Colin Watson wrote:
> My back-of-the-envelope calculation is that you need something
> approaching 10^80 key generations to have been performed before the risk
> of having one key in the broken space from any of them becomes
> non-negligible.

But openssh-blacklist looks at (partial) fingerprints, not whole keys; each
partial fingerprint should match many possible keys. Did you factor that into
your calculations?

-- 
see shy jo

Attachment: signature.asc
Description: Digital signature

Reply via email to