Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Discuss] KeePassX



On 08/14/2013 06:34 AM, Jerry Feldman wrote:
> Agreed. But, breaking the session key only works for a single message 
> or a single session. If they want to target a specific individual, 
> breaking the RSA/DSA keys will give them access to all encrypted 
> messages. (within the context is that a sent message is encrypted by 
> the recipient's public key), 

Yes, breaking the RSA/DSA key will let them read files or e-mails 
(effectively a file) encrypted with that public key.  But I think that 
if you are doing SSL with that public key, the key exchange cannot be 
understood by a passive observer, so passively recording the packets 
will not let someone later decrypt the exchange.


-kb




BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org