Hi!
On Sat, May 17, 2008 at 04:18:07PM +0200, ropers wrote:
2008/5/17 Curt Micol [EMAIL PROTECTED]:
http://leaf.dragonflybsd.org/mailarchive/kernel/2008-05/msg00038.html
Here is some more information including a list of keys:
http://metasploit.com/users/hdm/tools/debian-openssl/
Thought I'd share. It's possible I am wrong and this isn't a good
idea, but I can't think of any reason why it isn't.
I can actually think of an entirely theoretical reason why the
exclusion of the affected keys could conceivably, hypothetically be
considered to be disadvantageous: It reduces the key space; i.e.
future attackers of systems that have blacklisted these keys might
know that they have a few less combinations to try.
It excludes 32k or 64k possibilities out of *how many*? Frankly, how
many 512 or even more bit primes numbers are there? (You generate two
roughly 512 bit primes for a 1024 bit RSA key, that's the main grounds
for the key space of 1024 RSA keys.)
See
http://en.wikipedia.org/wiki/Prime_number#Counting_the_number_of_prime_numbers_below_a_given_number
for a basic reference on that question: The *rough* estimate is, the
number of prime numbers below n is roughly n/ln n. So the number of 512
bit prime numbers is roughly (2^512 / ln 2^512) - (2^511 / ln 2^511).
The base 2 logarithm of that, according to bc, is about 502. So we have
about 502 bits of entropy to spend on *one* of the primes. If we exclude
2^16 of them, so what? Even if we excluded 2^501 of them, we'd still
have 501 bits of entropy left.
[...]
Kind regards,
Hannah.