View Full Version : [all variants] How compromised are those openssl key?
May 24th, 2008, 03:22 AM
I'm not necesseraly interested in the technicalities but on a more practical level.
Like how long will it take to brake a compromised openssl key on todays hardware?
May 24th, 2008, 04:13 AM
This might help to answer your question: http://www.metasploit.com/users/hdm/tools/debian-openssl/
Q: How long does it take a crack a SSH user account using these keys?
A: This depends on the speed of the network and the configuration of the SSH server. It should be possible to try all 32,767 keys of both DSA-1024 and RSA-2048 within a couple hours, but be careful of anti-brute-force scripts on the target server.
EDIT: Though the above is specifically about ssh, I believe the ssl piece was also using the same relatively small key space because of the PRNG flaw.
May 24th, 2008, 04:23 AM
Hours! Wow i't worse thant I thought
Powered by vBulletin® Version 4.2.2 Copyright © 2014 vBulletin Solutions, Inc. All rights reserved.