The debian gaffe also affects any 'req's or self-signed certs created on the affected platform.

Unfortunately the blacklists generated by folks are not quite complete (yet) -- which took me a while to get confirmed and checked for. As a result of that process - and for your entertainment:

1) Full Moduli for affected keys on Little Endian 32 bit linux with GCC 4 - defaults:

        http://www.webweaving.org/tmp/moduli-run-1.txt.gz

2) Utility to point at a site to check (for just the above, false positives galore!):

        http://www.webweaving.org/tmp/checksite <fqdn>

As the simplified tables are still in the coming form the debian community - and it is always good to cross check:

-       if you run linux (any recent version)

-       and if you have a big endian machine

-       or a 64 bit machine

-       or if you happen to have a strange LE32bit machine.

And a few hours of CPU time on a modern machine.... then could you do me a favour and fetch:

        bhttp://www.webweaving.org/tmp/debian-gaffe.tgz

and run a few keys for me ?

The above shell script fetches openssl, compiles a specific variation an then (re)creates the 32k possible rsa keys, bcreating a file containing the Moduli (which can then can be cross checked against the output of openssl's its -modulus flag - when feed the cert of a random site).

For those on Little Endian, 32 bit machines - just the first 10 - 50 would be great - unless they differ from the included sample.txt - in which case I'd be very interested.

As I'd love to a) confirm that the next release of the debian tools is complete -and- b) I'd like to put to rest concerns I have that the keyspace is actually larger than expected due to gcc or other variations.

Thanks,

Dw

Reply via email to