Even though this really isn't a laughing matter for debian/downstream
users this cartoon is still priceless:

http://img.ircimages.com/ircimages/b/c/bcadc7e880d067f3a362adb111d193f9.jpg

Bernie

On Fri, May 16, 2008 at 12:06 PM, Robert Maxwell <[EMAIL PROTECTED]> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> In case anyone missed this, you need to update AND regenerate keys.
> This is a major vulnerability and should be addressed immediately.
> Affects both SSH and SSL keys.
>
> For more info (including analysis and links to more info), check out
> http://isc.sans.org/.
>
> Rob
>
> - --
> *******************************************************************************
> Robert Maxwell, CISSP, GCFA
> Lead Incident Handler                      OIT Security, University of
> Maryland
> rmaxwell at umd dot edu
> GnuPG Public Key:   http://security.umd.edu/contact/Robert_Maxwell.asc
> *******************************************************************************
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.8 (Darwin)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
>
> iEYEARECAAYFAkgt20EACgkQo4D6RWMNbXsRywCfTtzLEDNo56eYdAua59FVv2VK
> WCwAniVrK3+F11Y9ShTQfgoPGEO0ieso
> =flhe
> -----END PGP SIGNATURE-----
>

Reply via email to