Event JSON
{
"id": "c8865ff1e69f7a95223713a0d5030bb2f5b1eabbd0f6d00da382d3174d4322b4",
"pubkey": "b3087ccfbff4c2e2e16a3af148b6a3a27fe07bb1e7628b714a11e5f26711f263",
"created_at": 1715608588,
"kind": 1,
"tags": [
[
"p",
"baa7303f2d42f35f53ecf43db62c80fcd64bf77f6995ed80fb9ca1ef8d8ac0b5",
"wss://relay.mostr.pub"
],
[
"p",
"45be03643b1b47c02f8c4bf8932009f10ffaead3770fb1a9a559f2155450723b",
"wss://relay.mostr.pub"
],
[
"t",
"bimi"
],
[
"t",
"OpenSSL"
],
[
"t",
"Debian"
],
[
"proxy",
"https://mstdn.social/users/jschauma/statuses/112434124461104152",
"activitypub"
]
],
"content": "On the topic of \"key rotation, it's not just for HTTPS\", nostr:npub1h2nnq0edgte475lv7s7mvtyqlntyhamldx27mq8mnjs7lrv2cz6ssgk25t finds hundreds of DKIM keys apparently generated using the #Debian #OpenSSL predictable PRNG vulenrability from 2008 (CVE-2008-0166):\n\nhttps://16years.secvuln.info/\n\n(And yes, #BIMI is still stupid.)",
"sig": "d9eaf02f585e06b8edd4185c7ee058979c7cbe739451ca37109ed66d1da6768a38f979c1927926e9489fdb9c82cf07fc2342ba7b8a335f2fddfc306cc8641043"
}