-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

To all those using a Debian or Debian-based OS, it was discovered today
that a change was made to the Debian openssl package in 2006 that causes
the random number generator to be, um, not so random.  This
predictability has led to the recommendation that all keys using OpenSSL
(SSH keys, OpenVPN keys, etc) should be regenerated after updating to a
non-vulnerable version of OpenSSL.

Read the full advisory here:
http://article.gmane.org/gmane.linux.debian.security.announce/1614

- -Zack
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iD8DBQFIKdttjFVdEIeq2ygRAjUrAKCDnbiEvrFeTsLQjbEEjkZgbdHISwCcDs4V
J5w9cal7+CsMN/T6WcdUsJ0=
=eS64
-----END PGP SIGNATURE-----

Reply via email to