From: Adam Back <aba@dcs.ex.ac.uk>
To: cypherpunks@toad.com
Message Hash: b86960b4df87717ba2581fdf919a357706724407ac78e9bb8732adc42085089c
Message ID: <199611190950.JAA00412@server.test.net>
Reply To: N/A
UTC Datetime: 1996-11-19 20:24:10 UTC
Raw Date: Tue, 19 Nov 1996 12:24:10 -0800 (PST)
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 19 Nov 1996 12:24:10 -0800 (PST)
To: cypherpunks@toad.com
Subject: pgp bugs list?
Message-ID: <199611190950.JAA00412@server.test.net>
MIME-Version: 1.0
Content-Type: text/plain
I seem to remember someone saying that pgp's +makerandom function was
broken. However I'm unable to find any confirmation of this with a
web search.
I'm sure there used to be a known pgp bugs list held at MIT? I can't
find it now. Anyone know of the bugs lists whereabouts, or could
confirm/refute any security problems with +makerandom?
(premail uses it, pgp stealth could use it, if it worked).
[the (undocumented) feature is this:
pgp +makerandom=1024 out
creates 1024 bytes of what should be good random nos, in file "out"]
Adam
--
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`
Return to November 1996
Return to “Adam Back <aba@dcs.ex.ac.uk>”
1996-11-19 (Tue, 19 Nov 1996 12:24:10 -0800 (PST)) - pgp bugs list? - Adam Back <aba@dcs.ex.ac.uk>