[Tfug] Debian SSH vulnerability
Nate
nate at torzo.com
Tue May 13 15:38:23 MST 2008
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Er, frick... too fast on the send button.
This is what I meant to link to:
http://xkcd.com/221/
=P
Nate
Claude Rubinson wrote:
| Debian Users - it's time to regenerate our SSH keys. Turns out that
| Debian's random number generator isn't. See
| http://lists.debian.org/debian-security-announce/2008/msg00152.html
|
| Claude
|
| _______________________________________________
| Tucson Free Unix Group - tfug at tfug.org
| Subscription Options:
| http://www.tfug.org/mailman/listinfo/tfug_tfug.org
- --
Nate
System Admin Manager
System Administration
Ext 220
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFIKhhdRMRYK1K/wKQRAteBAKCksG57/NVD1xFs0i6ACkviTRbAdgCeJvHY
YCuwLFm1Jv6QlsWLmsEFBV8=
=ExNE
-----END PGP SIGNATURE-----
More information about the tfug
mailing list