I'm aware of simple brute-force attacks on short key IDs [0], which are just the last 32 bits of the fingerprint (e.g. 438CF0E2). With significant effort, one might be able to extend that to 64 bits.
I'd be much more surprised by a full fingerprint match. Wouldn't that imply a SHA-1 collision?
Yeah, the way the rules work magnesium is a dead-end. You have to double-oxygen to get to silicon, and then it's smooth sailing. (Note that all implemented reactions are listed if you scroll down)
You might be able to do something with the correlations of the index returns and stock returns, but I doubt their would be enough information there to depend on results.
So, I'm not sure about that one. Apparently s_client ignores the error and completes the connection because it's intended to be used for debugging.
> Currently the verify operation continues after errors so all the problems with a certificate chain can be seen. As a side effect the connection will never fail due to a server certificate verify failure.
I'd be much more surprised by a full fingerprint match. Wouldn't that imply a SHA-1 collision?
[0] http://www.asheesh.org/note/debian/short-key-ids-are-bad-new...