-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi Charlie,

On Sunday, November 30, 2003, at 10:33:27 AM PST, you wrote:

> Since the security alert from this week recommended revocation and
> replacement of encryption keys I figured I'd just let the list know
> my keys are changed now.

[snip]

> I also just wanted to remind others that this is a recommended
> course of action.

It should, however, be noted that only the *non-default* type of
ElGamal signing keys are affected by the vulnerability. If someone
created only the standard DH/DSS type key pair, there's no need to
revoke their keys and create new ones.

People should read carefully the announcement of the vulnerability,
and only revoke those keys that are truly vulnerable...if they have
any of that type (a minority of GnuPG users).

Here's the advisory:

http://lists.gnupg.org/pipermail/gnupg-announce/2003q4/000276.html

- --
Melissa

PGP public keys:
mailto:[EMAIL PROTECTED]&Body=Please%20send%20keys

-----BEGIN PGP SIGNATURE-----

iD8DBQE/ykFYjVbXUvsE8ukRAow7AKCiJTvUuPyEA6DkgR5UVppZZyQinwCfc3qX
bvQAY//NWXsPKzeOh8sNKfE=
=aaIC
-----END PGP SIGNATURE-----


Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com

Reply via email to