[완료]RSA 공개키 암복호화 에서 에러가 납니다.
파일을 읽어서 암호화 복호화를 프로그램을 만드는데요 이게 매번이 아니라 가끔씩 복호화가 안됩니다.
파일 읽고-> 암호화-> 파일쓰구
암호된 파일읽고-> 복호화->파일쓰기
이런과정인데 매번이 아니라 가끔
[1575:error:0407006B:rsa routines:RSA_padding_check_PKCS1_type_2:block type is not 02:rsa_pk1.c:207
1575:error:04064072:rsa routines:RSA_EAY_PRIVATE_DECRYPT:padding check failed:rsa_eay.c:330
1575:error:1408B076:SSL routines:SSL3_GET_CLIENT_KEY_EXCHANGE:bad rsa decrypt:s3_srvr.c:1259]
이럽니다. 이유가 몰까요?저 에러로 검색을 하니까 밑에 글이 나오는데...영어가 짧아서 대충 무슨 보안때문에 업그래이드를 해야한다.? 잘모르겠네요
Although applying vendor patches is the recommended course of action, you may wish to consider some of the following steps to reduce your exposure to this vulnerability:
Examine your log files for repeated error messages indicating failed requests for session-establishment. For example, sites using C2Net's Stronghold server would see error messages of the form
[Tue Jun 23 22:08:17 1998] SSL accept error
1575:error:0407006B:rsa routines:RSA_padding_check_PKCS1_type_2:block type is not 02:rsa_pk1.c:207
1575:error:04064072:rsa routines:RSA_EAY_PRIVATE_DECRYPT:padding check failed:rsa_eay.c:330
1575:error:1408B076:SSL routines:SSL3_GET_CLIENT_KEY_EXCHANGE:bad rsa
decrypt:s3_srvr.c:1259
If you are unable to upgrade for an extended period of time, you may wish to consider obtaining a new public/private key pair for servers. Changing the key pair only protects those sessions which may have been previously recorded by an intruder. This does not prevent an intruder from launching attacks against newly-recorded sessions. This should only be considered in those cases where upgrading is infeasible. Again, note that the public/private key pair is not at risk from this vulnerability.
Avoid using the same public/private key pair across multiple servers.
A large increase in CPU utilization or network traffic may accompany an attack. If your web server does not provide sufficient detail in its logs to detect failures, you may wish to look for substantial deviation from established usage patterns, which may be indicative of an attack.
Implementors and researchers should consult RSA Laboratories Bulletin Number 7 for additional measures to reduce the effectiveness of this attack. This document will be available at
[완료 문제는 파일을 바이너리로 열지 않는것에 있었습니다. 다른분은 참조하시길]
댓글 달기