1995-09-05 - Re: SSLRef (SSLtelnet)

Header Data

From: anon-remailer@utopia.hacktic.nl (Name Withheld by Request)
To: cypherpunks@toad.com
Message Hash: f9dd44120153817da09a475e6a70bda9fc5d211c2746550bda81500e59e69ff5
Message ID: <199509051940.VAA26244@utopia.hacktic.nl>
Reply To: <199509050417.VAA05211@jobe.shell.portal.com>
UTC Datetime: 1995-09-05 21:06:19 UTC
Raw Date: Tue, 5 Sep 95 14:06:19 PDT

Raw message

From: anon-remailer@utopia.hacktic.nl (Name Withheld by Request)
Date: Tue, 5 Sep 95 14:06:19 PDT
To: cypherpunks@toad.com
Subject: Re: SSLRef (SSLtelnet)
In-Reply-To: <199509050417.VAA05211@jobe.shell.portal.com>
Message-ID: <199509051940.VAA26244@utopia.hacktic.nl>
MIME-Version: 1.0
Content-Type: text/plain



Hal (hfinney@shell.portal.com) wrote:

>I understand that Netscape's browser will also accept certificates
>created by a Netscape-internal "test" CA.  I hoped that perhaps some
>junk certificates from that CA might be floating around, ones which
>would be useless for conventional purposes because their secret keys
>are exposed, but which would be perfect for my needs.

Is it possible that since this was only a "test" CA, that netscape used
less than a full-strength key?  If it was only 512 bits or so, we could
try cracking it.





Thread