Re: This seems like a good idea

2008-05-19 Thread Hannah Schroeter
Hi!

On Sat, May 17, 2008 at 04:18:07PM +0200, ropers wrote:
2008/5/17 Curt Micol [EMAIL PROTECTED]:
 http://leaf.dragonflybsd.org/mailarchive/kernel/2008-05/msg00038.html

 Here is some more information including a list of keys:
 http://metasploit.com/users/hdm/tools/debian-openssl/

 Thought I'd share.  It's possible I am wrong and this isn't a good
 idea, but I can't think of any reason why it isn't.

I can actually think of an entirely theoretical reason why the
exclusion of the affected keys could conceivably, hypothetically be
considered to be disadvantageous: It reduces the key space; i.e.
future attackers of systems that have blacklisted these keys might
know that they have a few less combinations to try.

It excludes 32k or 64k possibilities out of *how many*? Frankly, how
many 512 or even more bit primes numbers are there? (You generate two
roughly 512 bit primes for a 1024 bit RSA key, that's the main grounds
for the key space of 1024 RSA keys.)

See
http://en.wikipedia.org/wiki/Prime_number#Counting_the_number_of_prime_numbers_below_a_given_number
for a basic reference on that question: The *rough* estimate is, the
number of prime numbers below n is roughly n/ln n. So the number of 512
bit prime numbers is roughly (2^512 / ln 2^512) - (2^511 / ln 2^511).
The base 2 logarithm of that, according to bc, is about 502. So we have
about 502 bits of entropy to spend on *one* of the primes. If we exclude
2^16 of them, so what? Even if we excluded 2^501 of them, we'd still
have 501 bits of entropy left.

[...]

Kind regards,

Hannah.



Re: This seems like a good idea

2008-05-17 Thread ropers
2008/5/17 Curt Micol [EMAIL PROTECTED]:
 http://leaf.dragonflybsd.org/mailarchive/kernel/2008-05/msg00038.html

 Here is some more information including a list of keys:
 http://metasploit.com/users/hdm/tools/debian-openssl/

 Thought I'd share.  It's possible I am wrong and this isn't a good
 idea, but I can't think of any reason why it isn't.

I can actually think of an entirely theoretical reason why the
exclusion of the affected keys could conceivably, hypothetically be
considered to be disadvantageous: It reduces the key space; i.e.
future attackers of systems that have blacklisted these keys might
know that they have a few less combinations to try.

In the real world however, the affected keys will probably be the
first ones attackers will try, and the above is just an entirely
theoretical disadvantage -- and it's a much smaller disadvantage than
that constituted by continuing to allow the affected keys.

Kind regards,
--ropers



This seems like a good idea

2008-05-16 Thread Curt Micol
http://leaf.dragonflybsd.org/mailarchive/kernel/2008-05/msg00038.html

Here is some more information including a list of keys:
http://metasploit.com/users/hdm/tools/debian-openssl/

Thought I'd share.  It's possible I am wrong and this isn't a good
idea, but I can't think of any reason why it isn't.

-- 
# Curt Micol