Re: [CentOS] OpenSSL/SSH Bug on Debian - Compromised key pairs

2008-05-15 Thread Daniel de Kok
On Thu, May 15, 2008 at 12:20 AM, Clint Dilks [EMAIL PROTECTED] wrote:
 I know this may seem off topic, but I thought for those of us who might have
 Debian users generating key pairs that they put on CentOS systems people
 should be aware that

 everybody who generated a public/private keypair or an SSL
 cert request on Debian or Ubuntu from 2006 on is vulnerable

Yes, it is very important to follow up on this issue as soon as you
can (now) to see if any of your keys or those of your users are
affected. Additionally, it should be noted that in the case of *DSA*
keys, this can even affect users who do have good keys but used them
to communicate with a Debian server with the botched OpenSSL. An
explanation of this problem is provided here:

http://blog.sesse.net/blog/tech/2008-05-14-17-21_some_maths.html

Take care,
Daniel
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] OpenSSL/SSH Bug on Debian - Compromised key pairs

2008-05-15 Thread Daniel de Kok
On Thu, May 15, 2008 at 2:19 PM, Daniel de Kok [EMAIL PROTECTED] wrote:
 Yes, it is very important to follow up on this issue as soon as you
 can (now) to see if any of your keys or those of your users are
 affected. Additionally, it should be noted that in the case of *DSA*
 keys, this can even affect users who do have good keys but used them
 to communicate with a Debian server with the botched OpenSSL.

Jikes, rereading this, this does not seem accurate at all. Let me just
quote the advisory:

Furthermore, all DSA keys ever used on affected Debian systems for
signing or authentication purposes should be considered compromised;
the Digital Signature Algorithm relies on a secret random value used
during signature generation.

Take care,
Daniel
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] OpenSSL/SSH Bug on Debian - Compromised key pairs

2008-05-15 Thread Ned Slider

Daniel de Kok wrote:


Furthermore, all DSA keys ever used on affected Debian systems for
signing or authentication purposes should be considered compromised;
the Digital Signature Algorithm relies on a secret random value used
during signature generation.

Take care,
Daniel


SANS have more on this today and will likely continue to update the 
story as new developments emerge:


http://isc.sans.org/

To summarise, scripts that allow brute-forcing of keys are already in 
the wild - expect to see an upturn in activity on port 22 as a result. 
Further, for SSL secured websites, if the public key is known, no 
brute-forcing is even necessary.


Ned
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] OpenSSL/SSH Bug on Debian - Compromised key pairs

2008-05-15 Thread MHR
On Thu, May 15, 2008 at 5:27 AM, Daniel de Kok [EMAIL PROTECTED] wrote:

 Jikes, rereading this, this does not seem accurate at all. Let me just
 quote the advisory:

 Furthermore, all DSA keys ever used on affected Debian systems for
 signing or authentication purposes should be considered compromised;
 the Digital Signature Algorithm relies on a secret random value used
 during signature generation.


That made perfect sense to me:  If all the compromised systems used
the same (unrandomized) seed for the values of k, it would not be too
difficult for the determined cracker to break keys given enough CPU
power and an algorithm that could generate the exact same series of k
values (i.e., use the same random number generator, all of which are
NOT random if you know the seed).  All they need is one of the two
algorithms in Steinar's note, and goodbye security!

In theory, this same approach could be used to break any SSL keys, but
guessing the appropriate k value is roughly 2^128 times more
difficult (which is the whole point).

mhr
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


[CentOS] OpenSSL/SSH Bug on Debian - Compromised key pairs

2008-05-14 Thread Clint Dilks

Hi People,

I know this may seem off topic, but I thought for those of us who might 
have Debian users generating key pairs that they put on CentOS systems 
people should be aware that


everybody who generated a public/private keypair or an SSL
cert request on Debian or Ubuntu from 2006 on is vulnerable

http://it.slashdot.org/it/08/05/13/1533212.shtml

___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] OpenSSL/SSH Bug on Debian - Compromised key pairs

2008-05-14 Thread Ned Slider

Clint Dilks wrote:

Hi People,

I know this may seem off topic, but I thought for those of us who might 
have Debian users generating key pairs that they put on CentOS systems 
people should be aware that


everybody who generated a public/private keypair or an SSL
cert request on Debian or Ubuntu from 2006 on is vulnerable

http://it.slashdot.org/it/08/05/13/1533212.shtml



I've been following this story too after reading about it on SANS 
Internet Storm Center:


http://isc.sans.org/diary.html?storyid=4414

I wonder how far reaching this is. One wonders if any of the trusted 
root CAs have issued vulnerable certs as a result.

___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos