Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 06 Oct 2014 16:34:29 +0200
From: Pierre Schweitzer <pierre@...ctos.org>
To: oss-security@...ts.openwall.com
Subject: Re: OpenSSL RSA 1024 bits implementation broken?

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Following the information on that ML it appears not to be true.
Or at least, there's no obvious evidence it happened. And lack of
appropriate communication from reporter doesn't help getting rid of
doubts.
Unless I missed something from the thread you pointed?

On 10/06/2014 03:39 PM, Jeremy Stanley wrote:
> On 2014-10-06 11:33:03 +0200 (+0200), Pierre Schweitzer wrote:
>> There appear to have some noise on the Internet regarding a
>> possible flaw in the 1024 bits RSA implementation in OpenSSL
>> which would allow bruteforcing the private key in ~20 minutes.
>> 
>> Does anyone has any information about this? The associated
>> pastebin to the said information is:
>> http://pastebin.com/D8itq6Ff Is this serious?
> 
> It's been picked apart somewhat in a thread[1] on Perry Metzger's 
> moderated cryptography mailing list.
> 
> [1]
> http://www.metzdowd.com/pipermail/cryptography/2014-October/023142.html
>
> 
- -- 
Pierre Schweitzer <pierre@...ctos.org>
System & Network Administrator
Senior Kernel Developer
ReactOS Deutschland e.V.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBAgAGBQJUMqh1AAoJEHVFVWw9WFsLDm4P+wU+Wqd6BXENzOJWz/GVqVH1
3qwriMXMGz11LJEhK+/jVD0bUbMTrq1dTWcmSpAL4/jYgrkGDMBwwCp/ZtqtneJW
0Sax+5nbw/kYkxVHa4WqEizGatp9Ls2TeutLl/Jz0fzb7AN6X2Mxvi3d5CWrm6b1
8wP0LwYZOA8E+sIwqcp6JhEqbJO4VLT9AcN7JLtgPtQfU2YThp8KZZqtx1vYvSdk
F4qxTznICt1aM6UvxeaW/2KC9IMAw4Jn4fyW765O3vbHh67mL9+jshlDQO4a/S6Q
2UV9txnnuEoQhLPDGLzBx7VqsqAFh+v9gxwFLSBij9TpKWIZCVR+5URVJITzPlDW
DQWZHbdHUGNnRwsbNVnk5akwtj+nzN7Wp2/MAa5c+L6u0c3jsgAm7pkPF5WLJ6bC
8OtEdGeWJWFWl4vJtWnGk2Qx5dXONuTykhZaAPDo+JS9WmgiLCy2uycdNhyyeAft
gT0N0ZkcM5y7wKY0+tPAVQPzsR6NSDuuB1pPVb4RCxwjAA6S9Sneu+kBPrCOXG2a
5/UXGGcixxxOgoQ72d+Gd4MvuwEMcQnAWmyNcfiD5Yk7vdDGBi3jlM70Glz3a2iE
2hzqMQSq9ClFX1b8wYonUzaf1T33ocl5oo4yNbMK3E5Xe+R38jhWJWFNxmyk54RW
3KONSEmc7ytm2KPzWnTR
=6AHt
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.