Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

High volume SSL/SSH traffic. Systems can be configured to fall back to insecure random number generator under load but it creates an attack vector where you intentionally DoS a system, then have more leverage to crack the encryption based on the weak(read predictable) random data the encryption is based on. The practicality of such an attack is beyond my knowledge.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: