[cryptography] [Overhyped] Backdoor found in popular FPGA chip

2012-06-04 Thread Jeffrey Walton
A bit off topic, but interesting discussion of extracting keys from a chip using power analysis. http://www.h-online.com/security/news/item/Backdoor-found-in-popular-FPGA-chip-1585579.html ... The researchers located the JTAG (Joint Test Action Group) interface on the FPGA, used for programming t

Re: [cryptography] Microsoft Sub-CA used in malware signing

2012-06-04 Thread Thor Lancelot Simon
On Mon, Jun 04, 2012 at 10:20:33AM +0200, Erwann Abalea wrote: > It's also not clear about what could have been done with TS certificates. > Is it only codesigning, or TLS server as well? I'm surprised they can be used for code signing at all. TS (in its modern incarnation) is a TLS-encapsulated

Re: [cryptography] Microsoft Sub-CA used in malware signing

2012-06-04 Thread Erwann Abalea
It's also not clear about what could have been done with TS certificates. Is it only codesigning, or TLS server as well? -- Erwann. Le 4 juin 2012 09:57, "Marsh Ray" a écrit : > > In case its not clear from the filenames (e.g. the email system drops them) there were three certs revoked. These a

Re: [cryptography] Microsoft Sub-CA used in malware signing

2012-06-04 Thread Marsh Ray
On 06/04/2012 02:41 AM, Marsh Ray wrote: I've attached the revoked sub-CAs and their roots. In case its not clear from the filenames (e.g. the email system drops them) there were three certs revoked. These are the ones with "Licensing" in the CN. For convenience I also included the two roo

[cryptography] Microsoft Sub-CA used in malware signing

2012-06-04 Thread Marsh Ray
I'm sure many readers of the list will have heard by now, some Microsoft sub-CAs were used for signing malware. For the record here's an excerpt from the MS release and to save interested people time I've attached the revoked sub-CAs and their roots. There is some tantalizing bits about MD5