On 1/3/14, 12:12 PM, "Ralph Holz" <h...@net.in.tum.de> wrote:
>Tell me something new. ;-) Although in fact, the whole thing goes much
>deeper. A broken hash algorithm means root cert-like compromise as it
>means the capacity to imitate a correct signature by a root cert. There
>is no fix for this but blacklisting. Not in any model with TTPs, by the
>way.

You mean blacklisting the algorithm, right?


_______________________________________________
therightkey mailing list
therightkey@ietf.org
https://www.ietf.org/mailman/listinfo/therightkey

Reply via email to