[Bug 509990] Review Request: openssh-blacklist - Fingerprints of the keys affected by CVE-2008-0166

bugzilla at redhat.com bugzilla at redhat.com
Mon Jul 27 08:58:21 UTC 2009


Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=509990





--- Comment #18 from Tomas Hoger <thoger at redhat.com>  2009-07-27 04:58:20 EDT ---
Ok.  This still does not seem to have a very good 'required disk space on
mirrors' vs. 'expected number of users of the package' ratio, but maybe it's
just me.  I'd still consider splitting those private keys subpackages into one
with expected keys sizes (1024, 2048, 4096) and those of size less likely to be
used in the wild (1023, 2047).  Have you seen any research on most commonly
used ssh key sizes?

Do you have a tool that can be given a pid range and it'll generate all keys in
the range?  So the effort in generating missing keys can be split across
multiple systems?

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.




More information about the Fedora-package-review mailing list