And/or another solution would be a white-list-db. Once a key has been checked 
and was not vulnerable then it shouldn't be checked again.
You would have a file (white-list-db)and keep then the sha1 hashes of the keys 
that passed the test and are not vulnerable.
Next time a key has to be checked, first you look it up into the white-list-db. 
If is there skip the check. If is not there then make the check and if the key 
is good then add it to white-list-db.

-- 
network-manager-openvpn is incapable of supplying openssl-vulnkey with the 
X.509 key passphrase it requests
https://bugs.launchpad.net/bugs/230197
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to