Re: [CentOS] OpenSSL/SSH Bug on Debian - Compromised key pairs
On Thu, May 15, 2008 at 12:20 AM, Clint Dilks [EMAIL PROTECTED] wrote: I know this may seem off topic, but I thought for those of us who might have Debian users generating key pairs that they put on CentOS systems people should be aware that everybody who generated a public/private keypair or an SSL cert request on Debian or Ubuntu from 2006 on is vulnerable Yes, it is very important to follow up on this issue as soon as you can (now) to see if any of your keys or those of your users are affected. Additionally, it should be noted that in the case of *DSA* keys, this can even affect users who do have good keys but used them to communicate with a Debian server with the botched OpenSSL. An explanation of this problem is provided here: http://blog.sesse.net/blog/tech/2008-05-14-17-21_some_maths.html Take care, Daniel ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] OpenSSL/SSH Bug on Debian - Compromised key pairs
On Thu, May 15, 2008 at 2:19 PM, Daniel de Kok [EMAIL PROTECTED] wrote: Yes, it is very important to follow up on this issue as soon as you can (now) to see if any of your keys or those of your users are affected. Additionally, it should be noted that in the case of *DSA* keys, this can even affect users who do have good keys but used them to communicate with a Debian server with the botched OpenSSL. Jikes, rereading this, this does not seem accurate at all. Let me just quote the advisory: Furthermore, all DSA keys ever used on affected Debian systems for signing or authentication purposes should be considered compromised; the Digital Signature Algorithm relies on a secret random value used during signature generation. Take care, Daniel ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] OpenSSL/SSH Bug on Debian - Compromised key pairs
Daniel de Kok wrote: Furthermore, all DSA keys ever used on affected Debian systems for signing or authentication purposes should be considered compromised; the Digital Signature Algorithm relies on a secret random value used during signature generation. Take care, Daniel SANS have more on this today and will likely continue to update the story as new developments emerge: http://isc.sans.org/ To summarise, scripts that allow brute-forcing of keys are already in the wild - expect to see an upturn in activity on port 22 as a result. Further, for SSL secured websites, if the public key is known, no brute-forcing is even necessary. Ned ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] OpenSSL/SSH Bug on Debian - Compromised key pairs
On Thu, May 15, 2008 at 5:27 AM, Daniel de Kok [EMAIL PROTECTED] wrote: Jikes, rereading this, this does not seem accurate at all. Let me just quote the advisory: Furthermore, all DSA keys ever used on affected Debian systems for signing or authentication purposes should be considered compromised; the Digital Signature Algorithm relies on a secret random value used during signature generation. That made perfect sense to me: If all the compromised systems used the same (unrandomized) seed for the values of k, it would not be too difficult for the determined cracker to break keys given enough CPU power and an algorithm that could generate the exact same series of k values (i.e., use the same random number generator, all of which are NOT random if you know the seed). All they need is one of the two algorithms in Steinar's note, and goodbye security! In theory, this same approach could be used to break any SSL keys, but guessing the appropriate k value is roughly 2^128 times more difficult (which is the whole point). mhr ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
[CentOS] OpenSSL/SSH Bug on Debian - Compromised key pairs
Hi People, I know this may seem off topic, but I thought for those of us who might have Debian users generating key pairs that they put on CentOS systems people should be aware that everybody who generated a public/private keypair or an SSL cert request on Debian or Ubuntu from 2006 on is vulnerable http://it.slashdot.org/it/08/05/13/1533212.shtml ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] OpenSSL/SSH Bug on Debian - Compromised key pairs
Clint Dilks wrote: Hi People, I know this may seem off topic, but I thought for those of us who might have Debian users generating key pairs that they put on CentOS systems people should be aware that everybody who generated a public/private keypair or an SSL cert request on Debian or Ubuntu from 2006 on is vulnerable http://it.slashdot.org/it/08/05/13/1533212.shtml I've been following this story too after reading about it on SANS Internet Storm Center: http://isc.sans.org/diary.html?storyid=4414 I wonder how far reaching this is. One wonders if any of the trusted root CAs have issued vulnerable certs as a result. ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos