-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi Charlie,
On Sunday, November 30, 2003, at 10:33:27 AM PST, you wrote: > Since the security alert from this week recommended revocation and > replacement of encryption keys I figured I'd just let the list know > my keys are changed now. [snip] > I also just wanted to remind others that this is a recommended > course of action. It should, however, be noted that only the *non-default* type of ElGamal signing keys are affected by the vulnerability. If someone created only the standard DH/DSS type key pair, there's no need to revoke their keys and create new ones. People should read carefully the announcement of the vulnerability, and only revoke those keys that are truly vulnerable...if they have any of that type (a minority of GnuPG users). Here's the advisory: http://lists.gnupg.org/pipermail/gnupg-announce/2003q4/000276.html - -- Melissa PGP public keys: mailto:[EMAIL PROTECTED]&Body=Please%20send%20keys -----BEGIN PGP SIGNATURE----- iD8DBQE/ykFYjVbXUvsE8ukRAow7AKCiJTvUuPyEA6DkgR5UVppZZyQinwCfc3qX bvQAY//NWXsPKzeOh8sNKfE= =aaIC -----END PGP SIGNATURE-----
Want to buy your Pack or Services from MandrakeSoft? Go to http://www.mandrakestore.com