|
Full Disclosure
mailing list archives
Re: Working exploit for Debian generated SSH Keys
From: "Garrett M. Groff" <groffg () gmgdesign com>
Date: Mon, 19 May 2008 13:51:29 -0400
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I think the "wheel" in this context refers to exploit code, not PRNG code.
Generating pseudo-random numbers isn't hard given a good API, but writing
that API is non-trivial (assuming you want high entropy/low
predictability). And, apparently, screwing up that API is also very easy.
- - G
- ----- Original Message -----
From: "Skratz0r" <roryflyguy () googlemail com>
To: "nicolas vigier" <boklm () mars-attacks org>
Cc: <full-disclosure () lists grok org uk>
Sent: Monday, May 19, 2008 7:50 AM
Subject: Re: [Full-disclosure] Working exploit for Debian generated SSH
Keys
_>
#1: It cant be that hard to generate random numbers.
#2: It's hardly the wheel.
#3: Again, pointless arguments.
On 19 May 2008, at 12:09, nicolas vigier wrote:
On Mon, 19 May 2008, Ronald van der Westen wrote:
Why reinvent the wheel?
Why not ?
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.6.2 (Build 2014) - not licensed for commercial use:
www.pgp.com
wj8DBQFIMb4YSGIRT5oVahwRAuQXAJ9UkoJplYiA6DiVbeRTbkwTDoovZQCeN7ir
t3YvNW8PRxJh3Fb4VrZ1ZDo=
=+k/9
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
By Date
By Thread
Current thread:
Re: Working exploit for Debian generated SSH Keys reepex (May 19)
|