From: anon-remailer@utopia.hacktic.nl (Name Withheld by Request)
To: cypherpunks@toad.com
Message Hash: f9dd44120153817da09a475e6a70bda9fc5d211c2746550bda81500e59e69ff5
Message ID: <199509051940.VAA26244@utopia.hacktic.nl>
Reply To: <199509050417.VAA05211@jobe.shell.portal.com>
UTC Datetime: 1995-09-05 21:06:19 UTC
Raw Date: Tue, 5 Sep 95 14:06:19 PDT
From: anon-remailer@utopia.hacktic.nl (Name Withheld by Request)
Date: Tue, 5 Sep 95 14:06:19 PDT
To: cypherpunks@toad.com
Subject: Re: SSLRef (SSLtelnet)
In-Reply-To: <199509050417.VAA05211@jobe.shell.portal.com>
Message-ID: <199509051940.VAA26244@utopia.hacktic.nl>
MIME-Version: 1.0
Content-Type: text/plain
Hal (hfinney@shell.portal.com) wrote:
>I understand that Netscape's browser will also accept certificates
>created by a Netscape-internal "test" CA. I hoped that perhaps some
>junk certificates from that CA might be floating around, ones which
>would be useless for conventional purposes because their secret keys
>are exposed, but which would be perfect for my needs.
Is it possible that since this was only a "test" CA, that netscape used
less than a full-strength key? If it was only 512 bits or so, we could
try cracking it.
Return to September 1995
Return to “hallam@w3.org”