This bad use of RSA was reported back in Sept 2003. Is it fixed the
latest version?
tinc's real problem though is the handshake protocol, in which the client
and
server exchange random RSA-encrypted strings. That's raw bit strings,
there's
no PKCS #1 or OAEP padding, and the server is happy to act as an oracle for
you too. This is a terrible way to use RSA, and usually compromises the key.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
<http://www.tinc-vpn.org/pipermail/tinc-devel/attachments/20180314/2ab8caeb/attachment.html>