On Wed, May 28, 2008 at 08:01:11PM +0200, Ger Hobbelt wrote:
> Anything (such as passwords) which has been used on an *actual*
> 'compromized box' (be it one of 'those Debian' releases or otherwise)
> to _generate_ keys plus any keys _produced_ on such a compromised box
> must be eradicated and are not allowed entry. Anything derived from
> them will be lost or must be re-encrypted/re-created on a 'good
> system'.
> [...]

That's a pretty interesting thought process.

I should probably write about some of those scenarios.

For those who are interested in a discussion of proper RNG behavior,
see the section in my online book, here:

http://www.subspacefield.org/security/security_concepts.html#tth_sEc21
-- 
Crypto ergo sum.  https://www.subspacefield.org/~travis/
Truth does not fear scrutiny or competition, only lies do.
If you are a spammer, please email [EMAIL PROTECTED] to get blacklisted.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to