[Bug 509990] Review Request: openssh-blacklist - Fingerprints of the keys affected by CVE-2008-0166

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=509990





--- Comment #18 from Tomas Hoger <thoger@xxxxxxxxxx>  2009-07-27 04:58:20 EDT ---
Ok.  This still does not seem to have a very good 'required disk space on
mirrors' vs. 'expected number of users of the package' ratio, but maybe it's
just me.  I'd still consider splitting those private keys subpackages into one
with expected keys sizes (1024, 2048, 4096) and those of size less likely to be
used in the wild (1023, 2047).  Have you seen any research on most commonly
used ssh key sizes?

Do you have a tool that can be given a pid range and it'll generate all keys in
the range?  So the effort in generating missing keys can be split across
multiple systems?

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.

_______________________________________________
Fedora-package-review mailing list
Fedora-package-review@xxxxxxxxxx
http://www.redhat.com/mailman/listinfo/fedora-package-review

[Index of Archives]     [Fedora Legacy]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]