* Victor Duchovni wrote on Wed, May 28, 2008 at 21:10 -0400:
> > > Only against random attacks of course, if all attackers
> > > first check these keys, then removing them strengthens the
> > > algorithm against (non-random) brute-force attack. This
> > > said, the effort of explicitly avoiding these is probably
> > > wasted (unless one suspects one has a identically weak
> > > RNG).

I think blacklisting those keys on a strong system reduces the
key space (even if it just the smallest bit of a bit) and thus
helps the attacker, because she don't need to try those keys.

In this particular case I would expect an attacker testing those
`frequently existing' keys first (in the hope/expectation to hit
from time to time a key generated with such a valgrind-SSL :-)).
Noone requires brute-force to use a random probe order :-)

If assuming that because of this all RSA brute force attacks try
those keys first in all future, someone may wish to avoid such
keys (accepting a small decrease of key space).

On the other hand, someone else could assume that all potentially
weak keys are regenerated and the concerned (boxes,
systems, admins, security professionals, ...) now are more
sensitive, carefully exchanged all keys against, installed IDSes
scanning the network traffic for traces of weak keys and this
time double-verified everything, including exhaustive use of all
the black-hat attack tools to test themselfs, and from that
conclude that it makes no sense to check that keys at all because
noone will ever use them and if someone accidently created one,
security test tools will alert `potential valgrind-SSL key' or
alike.

   (I would start searching those `frequently existing' keys :-))

Does this make sense or am I wrong? A complicate topic I think,
and very interesting :)

oki,

Steffen
 
About Ingenico Throughout the world businesses rely on Ingenico for secure and 
expedient electronic transaction acceptance. Ingenico products leverage proven 
technology, established standards and unparalleled ergonomics to provide 
optimal reliability, versatility and usability. This comprehensive range of 
products is complemented by a global array of services and partnerships, 
enabling businesses in a number of vertical sectors to accept transactions 
anywhere their business takes them.
www.ingenico.com This message may contain confidential and/or privileged 
information. If you are not the addressee or authorized to receive this for the 
addressee, you must not use, copy, disclose or take any action based on this 
message or any information herein. If you have received this message in error, 
please advise the sender immediately by reply e-mail and delete this message. 
Thank you for your cooperation.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to