Re: The time to stop considering 1024 bit as secure is now !

2008-06-11 Thread Jean-Marc Desperrier
Paul Hoffman a écrit : > [...]. Note, however, that > they seem to be about the only group who is publishing any results from > their efforts. That could either mean they are the only group working on > it, or that other groups working on it are not getting publishable results. During about 5 year

Re: Bug question

2008-06-11 Thread Kyle Hamilton
If it's a persistent error in the profile, a bug needs to be filed anyway. I have not yet seen this behavior. -Kyle H 2008/6/11 Eddy Nigg (StartCom Ltd.) <[EMAIL PROTECTED]>: > Just want to ask before opening a new bug: Upon visiting a newly generated > server certificate, the OCSP server wasn't

Bug question

2008-06-11 Thread Eddy Nigg (StartCom Ltd.)
Just want to ask before opening a new bug: Upon visiting a newly generated server certificate, the OCSP server wasn't ready and/or the certificate chain wasn't complete. Ever since, I can't access this site and receive sec_error_untrusted_cert. Even when using a different sub domain (it's a wil

Re: The time to stop considering 1024 bit as secure is now !

2008-06-11 Thread Kyle Hamilton
We've actually had a discussion on this topic very recently. My understanding of what we've learned from that discussion (feel free to chime in if I'm not understanding properly): 1) The NIST (a US organization) states that after December 31, 2010, nobody should be using 1024-bit RSA keys to prot

Re: The time to stop considering 1024 bit as secure is now !

2008-06-11 Thread Michael Ströder
Paul Hoffman wrote: > Note, however, that > they seem to be about the only group who is publishing any results from > their efforts. That could either mean they are the only group working on > it, or that other groups working on it are not getting publishable results. Or 3. that other groups wo

Re: The time to stop considering 1024 bit as secure is now !

2008-06-11 Thread Paul Hoffman
At 3:01 PM +0200 6/11/08, Jean-Marc Desperrier wrote: >I might have reacted a bit too strongly on this news. +1 At 2:56 PM +0200 6/11/08, Jean-Marc Desperrier wrote: >Also I'd need to search for more reference, but I've been reading that >the factorisation of the 2^1039-1 Mersenne number >http://

JSS import / remove .p12 user certificate

2008-06-11 Thread joshuaaa
Hi guys, I'm looking for some guidance on how to import and remove .p12 user certificates in the firefox user cert store. I would imagine everything I need to accomplish this would be in the JSS PKCS12 library. Can anyone give me some details on how to go about doing this? I just want to keep thin

Re: Debian Weak Key Problem

2008-06-11 Thread Jean-Marc Desperrier
Gervase Markham wrote: > [...] >> If we see >> cooperation from CA's in quickly revoking those certs which are >> vulnerable, that would be enough to convince mozilla the right way to >> solve the problem is to depend on option 1 and fix revocation in the >> existing browsers. >> >> This is an oppo

Re: The time to stop considering 1024 bit as secure is now !

2008-06-11 Thread Eddy Nigg (StartCom Ltd.)
Jean-Marc Desperrier: Well I don't know why neither you nor Paul found it, maybe because you searched for exactly 650 bits, it should take only seconds to find references to the factorisation of RSA-640 and of RSA-200 (a 200 digits number that is in fact 663 bits long). http://www.rsa.com/rsalab

Re: The time to stop considering 1024 bit as secure is now !

2008-06-11 Thread Jean-Marc Desperrier
Jean-Marc Desperrier wrote: >[...] > If Kaspersky has made the analyze, and breaking a 1024 bit key is > reasonnably within reach of a distributed effort, that means nobody > should be using a 1024 key today for really important security. I might have reacted a bit too strongly on this news. I doe

Re: The time to stop considering 1024 bit as secure is now !

2008-06-11 Thread Jean-Marc Desperrier
Eddy Nigg (StartCom Ltd.) wrote: > Jean-Marc Desperrier: >> Eddy Nigg (StartCom Ltd.) wrote: >> >>> [...] >>> However more interesting is this reference: >>> >> No, that is not more interesting. It's been known for a year or two that >> keys around 600 bits were broken, and it was therefore alrea

Re: Debian Weak Key Problem

2008-06-11 Thread Gervase Markham
Robert Relyea wrote: > 1) work with CA's, in their existing infrastructures to get those certs > revoked. > 2) include that list of keys in the browser itself to detect this > compromise. > 3) build a parallel revocation scheme to phone home to mozilla (a.la. > anti-phishing) to identify sites with

Re: The time to stop considering 1024 bit as secure is now !

2008-06-11 Thread Gervase Markham
Jean-Marc Desperrier wrote: > Kaspersky Lab announces the launch of Stop Gpcode, an international > initiative against the blackmailer virus > http://www.kaspersky.com/news?id=207575651 That seems pointless to me. If they crack it after a few months, the virus author will just generate a new key

Re: The time to stop considering 1024 bit as secure is now !

2008-06-11 Thread Eddy Nigg (StartCom Ltd.)
Jean-Marc Desperrier: Eddy Nigg (StartCom Ltd.) wrote: [...] However more interesting is this reference: No, that is not more interesting. It's been known for a year or two that keys around 600 bits were broken, and it was therefore already quite obvious that 768 wasn't safe today.

Re: The time to stop considering 1024 bit as secure is now !

2008-06-11 Thread Jean-Marc Desperrier
samrat saha wrote: > what kind of techniques they are using to crack it.. > it cant be brute force at least. whats the mechanism they are using any > idea. In one word : general number field sieve. I think you should read the wikipedia entry about prime numbers factorization: http://en.wikipedia

Re: The time to stop considering 1024 bit as secure is now !

2008-06-11 Thread Jean-Marc Desperrier
Eddy Nigg (StartCom Ltd.) wrote: > [...] > However more interesting is this reference: No, that is not more interesting. It's been known for a year or two that keys around 600 bits were broken, and it was therefore already quite obvious that 768 wasn't safe today. But *only* 15000 computers and

Re: The time to stop considering 1024 bit as secure is now !

2008-06-11 Thread samrat saha
what kind of techniques they are using to crack it.. it cant be brute force at least. whats the mechanism they are using any idea. Samrat saha Proxim wireless pvt ltd 2008/6/11 Eddy Nigg (StartCom Ltd.) <[EMAIL PROTECTED]>: > Jean-Marc Desperrier: > > Kaspersky Lab announces the launch of Sto

Re: The time to stop considering 1024 bit as secure is now !

2008-06-11 Thread Eddy Nigg (StartCom Ltd.)
Jean-Marc Desperrier: Kaspersky Lab announces the launch of Stop Gpcode, an international initiative against the blackmailer virus http://www.kaspersky.com/news?id=207575651 If Kaspersky has made the analyze, and breaking a 1024 bit key is reasonnably within reach of a distributed effort, that m

Re: Debian Weak Key Problem

2008-06-11 Thread Jean-Marc Desperrier
Michael Ströder wrote: > Eddy Nigg (StartCom Ltd.) wrote: >> I could produce millions of keys in my free time and post them to some >> web site...I could tell you now that those are all compromised keys >> and all CAs should now scan their subscribers keys against the ones I >> posted. Should it fi

Re: The time to stop considering 1024 bit as secure is now !

2008-06-11 Thread samrat saha
Kaspersky still now not able to break 1024 bit key, they highest bit size they claimed to break is 660. samrat On Wed, Jun 11, 2008 at 2:01 PM, Jean-Marc Desperrier <[EMAIL PROTECTED]> wrote: > Kaspersky Lab announces the launch of Stop Gpcode, an international > initiative against the blackmail

The time to stop considering 1024 bit as secure is now !

2008-06-11 Thread Jean-Marc Desperrier
Kaspersky Lab announces the launch of Stop Gpcode, an international initiative against the blackmailer virus http://www.kaspersky.com/news?id=207575651 If Kaspersky has made the analyze, and breaking a 1024 bit key is reasonnably within reach of a distributed effort, that means nobody should be