Re: Can we trust RedHAt encryption tools?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On 1/9/2014 15:52, m.roth@xxxxxxxxx wrote:
> Robert Moskowitz wrote:
>>
>> Only algorithm they compromised was an RNG that got pretty strong thumbs
>> down from the real cryptographers.  They have not compromised any IETF
>> standard;
>
> Not quite - anyone mandated to POSIX standards are effectively mandated to
> use the compromised algorithms, as I understand it.

I think you mean FIPS 140-2, not POSIX: http://goo.gl/nLTCF8
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos




[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux