Colin Watson wrote: > My back-of-the-envelope calculation is that you need something > approaching 10^80 key generations to have been performed before the risk > of having one key in the broken space from any of them becomes > non-negligible. But openssh-blacklist looks at (partial) fingerprints, not whole keys; each partial fingerprint should match many possible keys. Did you factor that into your calculations? -- see shy jo
Attachment:
signature.asc
Description: Digital signature