OpenSSL

Scott Francis darkuncle at darkuncle.net
Tue Mar 18 01:18:23 UTC 2003


On Mon, Mar 17, 2003 at 12:55:24PM -0500, smb at research.att.com said:
> In message <20030317173458.GC9680 at darkuncle.net>, Scott Francis writes:
> >
> 
> >
> >Fun is about all it comes to. See what Schneier had to say in the most
> >recent crypto-gram regarding this hole.
> ><http://www.counterpane.com/crypto-gram-0303.html>
> 
> This is a new attack, not the one Schneier was talking about.  It's 
> very elegant work -- they actually implemented an attack that can 
> recover the long-term private key.  The only caveat is that their 
> attack currently works on LANs, not WANs, because they need more 
> precise timing than is generally feasible over the Internet.

Hm, mea culpa. I read the title without digging very far into the actual
announcements and thought it a rehash of the earlier holes. Thanks for
clearing it up for me.
-- 
Scott Francis || darkuncle (at) darkuncle (dot) net
      illum oportet crescere me autem minui
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20030317/803b0b89/attachment.sig>


More information about the NANOG mailing list