On 1/3/14, 12:12 PM, "Ralph Holz" <h...@net.in.tum.de> wrote: >Tell me something new. ;-) Although in fact, the whole thing goes much >deeper. A broken hash algorithm means root cert-like compromise as it >means the capacity to imitate a correct signature by a root cert. There >is no fix for this but blacklisting. Not in any model with TTPs, by the >way.
You mean blacklisting the algorithm, right? _______________________________________________ therightkey mailing list therightkey@ietf.org https://www.ietf.org/mailman/listinfo/therightkey