Home page logo

nanog logo nanog mailing list archives

Re: Security team successfully cracks SSL using 200 PS3's and MD5
From: "Christopher Morrow" <morrowc.lists () gmail com>
Date: Sat, 3 Jan 2009 01:31:08 -0500

On Fri, Jan 2, 2009 at 10:44 PM, Dragos Ruiu <dr () kyx net> wrote:

On 2-Jan-09, at 6:53 PM, Gadi Evron wrote:

Yes, this is a serious matter, but it hardly has any operational impact to
speak of for users and none for NSPs.

Dunno. Last I checked NSPs had web servers too. :-P

so, aside from 'get a re-issued cert signed SHA-1 from an approved CA
that's SHA-1 signed as well' what's the recourse for an NSP?


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]