n according to its
manual page. In practice, it appears to be using AES-256. I would be
surprised if the GnuPG version shipped by the most developer-friendly
Linux OS on the planet defaulted to a 64-bit block cipher. Perhaps an
earlier version of GnuPG did default to CAST5 block cipher, as Wikipedia
article states.
qmi
ptographic standards for
symmetric encryption, not only CAST5. For e.g., it does support twofish
and aes. Both of which use 128-bit block sizes, AFAIK. See command
output for gpg below about supported algorithms:
"
qmi@qmiacer:~$ gpg --version
gpg (GnuPG) 2.2.12
(...)
Supported algorithms:
P
t tracker deals with the issue
but to dismiss the false assumption that the reader might have come to,
namely, the security issues are not handled - or to be seen not handled -
properly in Debian Linux.
(... 'CVE is not assigned yet, but we should track and try to fix it.' ... )
Regards,
--
qmi | Debian GNU/Linux enthusiast
Email: li...@miklos.info
WWW: http://www.miklos.info
GPG: 3C4B 1364 A379 7366 7FED 260A 2208 F2CE 3FCE A0D3
Hi
On Wed, Dec 19, 2018 at 04:40:36PM +0900, Hideki Yamane wrote:
> On Tue, 18 Dec 2018 23:36:24 +0100
> qmi wrote:
> > This vulnerability seems to have been already handled. See URL:
> > https://security-tracker.debian.org/tracker/TEMP-0566326-9A899F
>
> No, we shoul
ry about "Magellan" bug
> in sqlite, that was fixed in upstream 3.26.0.
> See https://blade.tencent.com/magellan/index_en.html
>
> CVE is not assigned yet, but we should track and try to fix it.
>
> --
> Hideki Yamane
Tell me if I am wrong.
Regards,
--
qmi
n-howto/ch10.en.html#s-intrusion-detect
.
Regards,
--
qmi | Debian GNU/Linux enthusiast
WWW: www.miklos.info
GPG: 3C4B 1364 A379 7366 7FED 260A 2208 F2CE 3FCE A0D3
6 matches
Mail list logo