GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Embed Notice

HTML Code

Corresponding Notice

  1. Embed this notice
    翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Monday, 13-Nov-2023 22:18:16 JST翠星石翠星石
    in reply to
    • Quad
    @quad There's no real reason to switch to ed25519 if you've already generated 2048+ bit RSA keys, but ed25519 are good for new keys, as they're a lot shorter.

    The issue seems to affect proprietary ssh clients that are poorly programmed and not the RSA scheme itself, so the solution turns out to be not running proprietary malware yet again.

    I'm reminded of a past case where a bunch of proprietary TLS libraries all used the same weak primes (numbers that seem prime, but aren't) for key derivation (rather than randomly generating a strong prime as required by the spec), meaning the NSA and other parties could just do a bunch of brute-forcing against those weak primes and use the results to attack sessions using those weak primes, but I guess this one is fairly different.
    In conversationMonday, 13-Nov-2023 22:18:16 JST from freesoftwareextremist.compermalink
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.