Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'd also suggest looking at the rsa public exponents. PuTTY and OpenSSH (at least used to) use their own values when generating keys, so you can somewhat reliably identify which keys were generated by these tools


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: