From owner-freebsd-security@FreeBSD.ORG Sun Jun 24 18:34:46 2012 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 3AA971065670 for ; Sun, 24 Jun 2012 18:34:46 +0000 (UTC) (envelope-from rsimmons0@gmail.com) Received: from mail-vc0-f182.google.com (mail-vc0-f182.google.com [209.85.220.182]) by mx1.freebsd.org (Postfix) with ESMTP id E9DA88FC0A for ; Sun, 24 Jun 2012 18:34:45 +0000 (UTC) Received: by vcbfy7 with SMTP id fy7so2035366vcb.13 for ; Sun, 24 Jun 2012 11:34:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=7HOXBiTc5Vqb6rRgyDk2vPc+vbuoVFcs1CTkQ077oEY=; b=WtXXFOXy0+1j2jytfS7DoyKglu8ARVr2PW+mfdf5wRgJl4Usl94FRiGxiKBlKNQRgT DyYIIVdhUEF8cwKwIsdGEt1tB2mJKazeacKJahfgn5BYJWDokgP6D6diK295+6RQGChf uuTFD042xhwy07prW7S+cZMvaBkwQjYu/XeHRAQUpArlcwT23bAMAfTGj/HR9/aJ85Py MiNw0ysi3BmpnfZ9ieVSh80rPmwQ9mURqocLGOPRXiWR5hGeNKdGBBg5g9flmMfe+uTh CI+LP2qR62KQ5MwfY9M2a2DXAmOiZit5IfDaOWlNc71E7yi4gymgcw1DpNBz1cBHFvJI a/Bw== MIME-Version: 1.0 Received: by 10.52.35.66 with SMTP id f2mr4962282vdj.31.1340562885315; Sun, 24 Jun 2012 11:34:45 -0700 (PDT) Received: by 10.52.16.148 with HTTP; Sun, 24 Jun 2012 11:34:45 -0700 (PDT) Date: Sun, 24 Jun 2012 14:34:45 -0400 Message-ID: From: Robert Simmons To: freebsd-security@freebsd.org Content-Type: text/plain; charset=ISO-8859-1 Subject: Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables... X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 24 Jun 2012 18:34:46 -0000 In light of advanced in processors and GPUs, what is the potential for duplication of RSA, DSA, and ECDSA keys at the current default key lengths (2048, 1024, and 256 respectively)?