å é±1/24(å)ã«æ±æ¸åã»ãã¥ãªãã£åå¼·ä¼ã§ãå¶ç¶ã«ã500ä¸åã®SSHå ¬ééµãæã«å ¥ãã俺ãã¡ã¯ãã¨ããã¿ã¤ãã«ã§LTçºè¡¨ãã¦ãã¾ããã以ä¸ãçºè¡¨è³æã§ãã ãã®ãã¬ã¼ã³è³æã¯LTç¨ã«å§ç¸®ãã¦ä½ã£ãã®ã§ããããã«ããé¨åããã£ãããããã¾ãããããã§ãQ&Aå½¢å¼ã§è£è¶³ãæ¸ãã¦ã¿ã¾ããã ãå¤æ°ã®å ¬ééµããå ±éã®ç´ å æ°ãæ¢ãæ»æã¯SSHã¦ã¼ã¶ã¼éµã«ã¤ãã¦ãç¾å®çè å¨ãªã®ãï¼ã çµè«ããè¨ãã¨ãSSHã¦ã¼ã¶ã¼éµã«éãã°è å¨ã§ãªãã¨ããã®ãå人çãªèãã§ãã ä»åãè«æãMining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devicesã(PDF)ãåèã«å¤æ°ã®RSAå ¬ééµããæå¤§å ¬ç´æ°ãæ±ãããããªæ»æãSSHã¦ã¼ã¶ã¼éµã«ã¤ãã¦è©¦ãã¦ã¿ã¾ãããå è«æã§ã¯ããã®æ»æã¯SSHãã¹ãéµã¨SSL証ææ¸ã«å¯¾ãã¦è¡ãã
{{#tags}}- {{label}}
{{/tags}}