On Tue, Mar 18, 2014 at 07:41:22PM +0100, Arno Töll wrote:
I'm not so sure what you're worried about. I am the author of that page,
and I'm perfectly fine if you replace whatever statement you like to
make it suitable to Ubuntu. Feel free to remove any mentioning of Debian
if you think that's
Thorsten Glaser wrote:
Florian Weimer dixit:
Historically, the OpenSSL command line tools have been intended for
debugging only.
I disagree, in the case of genrsa and friends anyway.
Me too, and openssl(1ssl) does not mention debugging or not for
production use or give any warnings. Also,
Control: severity -1 normal
Joey Hess dixit:
Also, /usr/sbin/make-ssl-cert uses openssl req, and strace shows it
also reading only 32 bytes bits of entropy.
We talked a bit about it in IRC. I think this is no need to panic.
While I still think that 32 bytes is cutting off a safety margin
I’d
The amount of seed material required to generate a cryptographic key
equals the effective key size of the key. For example, a 3072-bit RSA
or Diffie-Hellman private key has an effective key size of 128 bits (it
requires about 2^128 operations to break) so a key
4 matches
Mail list logo