Today, 16 years ago, Debian published a security advisory announcing CVE-2008-0166, a severe bug in their OpenSSL package that effectively broke the random number generator and limited the key space to a few ten thousand keys. The vulnerability affected Debian+Ubuntu between 2006 and 2008. In 2007, an email signature system called DKIM was introduced. Is it possible that people configured DKIM in 2007, never changed their key, and are still vulnerable to CVE-2008-0166? https://16years.secvuln.info/
16 years of CVE-2008-0166 - Debian OpenSSL Bug

Many DKIM setups used cryptographic keys vulnerable to the 2008 Debian OpenSSL Bug (CVE-2008-0166) in 2024.

@hanno hang on, *Entrust* was using a Debian weak key for their DKIM signing? That's just made my day.
@hanno very good work indeed. Bravo 👏
@hanno Haha, just clicked the link, to have a good nostalgic read on my train ride about some long forgotten fuckup.
But then it got more and more side tracked into a truly magnificent dumpster fire!
Great work and great story! Loved it =)

I wonder why the M&S Food Hall smell is very different to other supermarkets? Most places go for a mixture of vanilla, yeast and leafy, but in M&S it's always a kind of salty, humousy attack-olive kind of smell.

It's a Rolexy LinkedIn kind of smell; an Opportunities for Networking, kind of smell; a Let Me Show You Our New Kitchen kind of smell; a Trap You In A Corner To Talk About AI and Bitcoin kind of Smell.

Such a fearful scent -- M&S so clearly scented Not For Me.

@hanno yes!

Seen that in the wild.

Sadly that's covered by an NDA!

@hanno i´m using one of the email providers mentioned- oh no ​
@hanno I have I scanner for dkim keys... 🤔
@hanno I still find it wild that somebody tried to get a certificate with a Debian weak key in 2020 from ssl.com: https://groups.google.com/g/mozilla.dev.security.policy/c/2uuXLPwGoSA/m/bqUDTXPSAgAJ - I mean: HOW?
ssl.com: Certificate with Debian weak key