[nsp-sec] ASN list with weak Debian/OpenSSL keys

Kevin Oberman oberman at es.net
Fri Jan 23 12:16:52 EST 2009


> Date: Fri, 23 Jan 2009 11:20:11 -0500
> From: Gabriel Iovino <giovino at ren-isac.net>
> Sender: nsp-security-bounces at puck.nether.net
> 
> ----------- nsp-security Confidential --------
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Florian Weimer wrote:
> > The following hosts use SSL certificates on port 443/TCP which are
> > affected by CVE-2008-0166 and should be considered compromised. 
> 
> Sanitized notifications will be sent to the following:
> 
> 7018  | 12.108.93.221   | warriornet.rc.edu
> 40127 | 134.174.150.107 | drosophila.med.harvard.edu
> 
> As always, to any EDUs that are also NSP-SEC members, I apologize for
> the duplication.

No need to apologize! Dups are easy to ignore. Notifications not received
are ALWAYS ignored.
-- 
R. Kevin Oberman, Network Engineer
Energy Sciences Network (ESnet)
Ernest O. Lawrence Berkeley National Laboratory (Berkeley Lab)
E-mail: oberman at es.net			Phone: +1 510 486-8634
Key fingerprint:059B 2DDF 031C 9BA3 14A4  EADA 927D EBB3 987B 3751



More information about the nsp-security mailing list