<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body>
<p><font face="Calibri">Might a third option be the tool developed
by Hanno Boeck?</font></p>
<p><font face="Calibri"><a class="moz-txt-link-freetext" href="https://github.com/badkeys/badkeys">https://github.com/badkeys/badkeys</a></font></p>
<p>From our point of view it's an effective tool.</p>
<p><font face="Calibri">Adriano</font></p>
<p><font face="Calibri"></font><br>
</p>
<div class="moz-cite-prefix">Il 09/06/2022 15:18, Chris Kemmerer via
Servercert-wg ha scritto:<br>
</div>
<blockquote type="cite"
cite="mid:01000181489e2a9c-837249c7-c025-4cf9-a0c6-d65b313cdb3c-000000@email.amazonses.com">
<div>Suggested tools that CAs MAY use to obtain lists of Debian
weak keys include:</div>
<div><br>
</div>
<div> - <a class="moz-txt-link-freetext" href="https://github.com/CVE-2008-0166">https://github.com/CVE-2008-0166</a> provides a generator,
for the complete set of parameters listed above, that runs on
any modern 64-bit Linux system; it also provides complete sets
of pregenerated keys for the most common RSA key sizes.</div>
<div> - <a class="moz-txt-link-freetext" href="https://github.com/HARICA-official/debian-weak-keys">https://github.com/HARICA-official/debian-weak-keys</a>
provides a generator, for a subset of the parameters listed
above, that can take advantage of a computer cluster.</div>
</blockquote>
</body>
</html>