[46325] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: 1024-bit RSA keys in danger of compromise (fwd)

daemon@ATHENA.MIT.EDU (Richard A Steenbergen)
Mon Mar 25 19:29:03 2002

Date: Mon, 25 Mar 2002 19:28:31 -0500
From: Richard A Steenbergen <ras@e-gerbil.net>
To: Len Sassaman <rabbi@quickie.net>
Cc: nanog@merit.edu
Message-ID: <20020326002831.GP19704@overlord.e-gerbil.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <Pine.LNX.4.30.QNWS.0203251505280.12074-100000@thetis.deor.org>
Errors-To: owner-nanog-outgoing@merit.edu


On Mon, Mar 25, 2002 at 03:32:08PM -0800, Len Sassaman wrote:
> 
> What is most concerning to me is a few discoveries that were made while
> looking into the problem of widespread use of 1024 bit keys:

Personally I'm not too concerned (yet). You're probably worse off due to 
implementation flaws.

But on a list of things which "should be fixed" for the future: Any RSA
implementation using RSARef (which until the patent expired was the only
legal way to write RSA implementations in the US) is limited to < 1024
bits.

I can think of a few vendors using embedded SSH who still suffer from this
problem (Vendor F comes to mind, but their SSH implementation also doesn't
work with OpenSSH w/freebsd localisations, so something else is afoot
there as well).

-- 
Richard A Steenbergen <ras@e-gerbil.net>       http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)

home help back first fref pref prev next nref lref last post