<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
  </head>
  <body>
    <p><font face="Calibri">Might a third option be the tool developed
        by Hanno Boeck?</font></p>
    <p><font face="Calibri"><a class="moz-txt-link-freetext" href="https://github.com/badkeys/badkeys">https://github.com/badkeys/badkeys</a></font></p>
    <p>From our point of view it's an effective tool.</p>
    <p><font face="Calibri">Adriano</font></p>
    <p><font face="Calibri"></font><br>
    </p>
    <div class="moz-cite-prefix">Il 09/06/2022 15:18, Chris Kemmerer via
      Servercert-wg ha scritto:<br>
    </div>
    <blockquote type="cite"
cite="mid:01000181489e2a9c-837249c7-c025-4cf9-a0c6-d65b313cdb3c-000000@email.amazonses.com">
      <div>Suggested tools that CAs MAY use to obtain lists of Debian
        weak keys include:</div>
      <div><br>
      </div>
      <div>  - <a class="moz-txt-link-freetext" href="https://github.com/CVE-2008-0166">https://github.com/CVE-2008-0166</a> provides a generator,
        for the complete set of parameters listed above, that runs on
        any modern 64-bit Linux system; it also provides complete sets
        of pregenerated keys for the most common RSA key sizes.</div>
      <div>  - <a class="moz-txt-link-freetext" href="https://github.com/HARICA-official/debian-weak-keys">https://github.com/HARICA-official/debian-weak-keys</a>
        provides a generator, for a subset of the parameters listed
        above, that can take advantage of a computer cluster.</div>
    </blockquote>
  </body>
</html>