[nsp-sec] ASN list with weak Debian/OpenSSL keys
Kevin Oberman
oberman at es.net
Fri Jan 23 12:16:52 EST 2009
> Date: Fri, 23 Jan 2009 11:20:11 -0500
> From: Gabriel Iovino <giovino at ren-isac.net>
> Sender: nsp-security-bounces at puck.nether.net
>
> ----------- nsp-security Confidential --------
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Florian Weimer wrote:
> > The following hosts use SSL certificates on port 443/TCP which are
> > affected by CVE-2008-0166 and should be considered compromised.
>
> Sanitized notifications will be sent to the following:
>
> 7018 | 12.108.93.221 | warriornet.rc.edu
> 40127 | 134.174.150.107 | drosophila.med.harvard.edu
>
> As always, to any EDUs that are also NSP-SEC members, I apologize for
> the duplication.
No need to apologize! Dups are easy to ignore. Notifications not received
are ALWAYS ignored.
--
R. Kevin Oberman, Network Engineer
Energy Sciences Network (ESnet)
Ernest O. Lawrence Berkeley National Laboratory (Berkeley Lab)
E-mail: oberman at es.net Phone: +1 510 486-8634
Key fingerprint:059B 2DDF 031C 9BA3 14A4 EADA 927D EBB3 987B 3751
More information about the nsp-security
mailing list