Re: [CentOS] Re: [CentOS-announce] Impact of the Debian OpenSSL vulnerability

2008-05-19 Thread Les Mikesell

Ralph Angenendt wrote:



- What does our upstream think about this?
- What do the OpenSSH developers think about this?

Someone is going to need to ask those questions of the people...


I don't think the OpenSSH devels really do care about that - there is no
discussion whatsoever on the secureshell list or on the devel list.

No idea about our upstream, but I don't think so either.


Does anyone know the point of the patch in the first place?  That is, 
why would a distro-specific modification have been needed at all?  I 
don't suspect an intentional compromise here but I'm curious about why 
anyone would consider a non-standard change.


--
  Les Mikesell
   [EMAIL PROTECTED]
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Re: [CentOS-announce] Impact of the Debian OpenSSL vulnerability

2008-05-19 Thread Johnny Hughes

Les Mikesell wrote:

Ralph Angenendt wrote:



- What does our upstream think about this?
- What do the OpenSSH developers think about this?

Someone is going to need to ask those questions of the people...


I don't think the OpenSSH devels really do care about that - there is no
discussion whatsoever on the secureshell list or on the devel list.

No idea about our upstream, but I don't think so either.


Does anyone know the point of the patch in the first place?  That is, 
why would a distro-specific modification have been needed at all?  I 
don't suspect an intentional compromise here but I'm curious about why 
anyone would consider a non-standard change.




The change was added due to valgrind testing of openssh and warnings 
produced while compiling.


The removal was discussed on the openssh-devel list.

If was clearly an accident caused by trying to do the right thing.



signature.asc
Description: OpenPGP digital signature
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Re: [CentOS-announce] Impact of the Debian OpenSSL vulnerability

2008-05-19 Thread Daniel de Kok
On Mon, May 19, 2008 at 3:53 PM, Johnny Hughes [EMAIL PROTECTED] wrote:
 Les Mikesell wrote:
 Does anyone know the point of the patch in the first place?  That is, why
 would a distro-specific modification have been needed at all?  I don't
 suspect an intentional compromise here but I'm curious about why anyone
 would consider a non-standard change.


 The change was added due to valgrind testing of openssh and warnings
 produced while compiling.

 The removal was discussed on the openssh-devel list.

 If was clearly an accident caused by trying to do the right thing.

And a miscommunication, it seems that the OpenSSL developers the patch
was just used for debugging purposes, while the Debian packages
understood it as a confirmation that the patch was ok.

Errors do happen, even to the brightest of all developers. Though,
most bugs do not have such  far-reaching consequences. The best thing
is to learn from it, and to move on.

Take care,
Daniel
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Re: [CentOS-announce] Impact of the Debian OpenSSL vulnerability

2008-05-18 Thread Ralph Angenendt
Karanbir Singh wrote:
 Daniel de Kok wrote:
 - What does our upstream think about this?
 - What do the OpenSSH developers think about this?

 Someone is going to need to ask those questions of the people...

I don't think the OpenSSH devels really do care about that - there is no
discussion whatsoever on the secureshell list or on the devel list.

No idea about our upstream, but I don't think so either.

Ralph


pgpcEf1ntGCuU.pgp
Description: PGP signature
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Re: [CentOS-announce] Impact of the Debian OpenSSL vulnerability

2008-05-18 Thread Les Bell

Ralph Angenendt [EMAIL PROTECTED] wrote:


I don't think the OpenSSH devels really do care about that - there is no
discussion whatsoever on the secureshell list or on the devel list.

No idea about our upstream, but I don't think so either.


Correct: all that needs to be said was said years ago, by Dr. Robert E.
Coveyou, of Oak Ridge National Laboratory (now NIST):

The generation of random numbers is to important to be left to chance.

Best,

--- Les Bell, RHCE, CISSP
[http://www.lesbell.com.au]
Tel: +61 2 9451 1144
FreeWorldDialup: 800909


___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Re: [CentOS-announce] Impact of the Debian OpenSSL vulnerability

2008-05-18 Thread Daniel de Kok
On Sun, May 18, 2008 at 10:06 AM, Les Bell [EMAIL PROTECTED] wrote:
 The generation of random numbers is to important to be left to chance.

Speaking of which, this seems to be a nice poor man's hardware RNG,
that uses ALSA:

http://www.digital-scurf.org/software/randomsound

(Per Russell Coker's excellent blog.)

-- Daniel
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Re: [CentOS-announce] Impact of the Debian OpenSSL vulnerability

2008-05-18 Thread Ralph Angenendt
Daniel de Kok wrote:
 Speaking of which, this seems to be a nice poor man's hardware RNG,
 that uses ALSA:
 
 http://www.digital-scurf.org/software/randomsound

For the slightly richer man:

http://warmcat.com/_wp/whirlygig-rng/

:)

Cheers,

Ralph


pgpz6FYX6Qp13.pgp
Description: PGP signature
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Re: [CentOS-announce] Impact of the Debian OpenSSL vulnerability

2008-05-18 Thread Stephen John Smoogen
On Sat, May 17, 2008 at 7:57 PM, Karanbir Singh [EMAIL PROTECTED] wrote:
 Daniel de Kok wrote:

 - What does our upstream think about this?
 - What do the OpenSSH developers think about this?

 Someone is going to need to ask those questions of the people...


I don't think either Red Hat or OpenSSH are going to do much with
this. From what I have been told the search for bad ssh items if used
inside of SSH slows down connections quite a bit because it does a
search through the 1.5 MB space everything you connect. However, that
could have been fixed with a quicker search algorithm by now

 --
 Karanbir Singh : http://www.karan.org/  : [EMAIL PROTECTED]
 ___
 CentOS mailing list
 CentOS@centos.org
 http://lists.centos.org/mailman/listinfo/centos




-- 
Stephen J Smoogen. -- BSD/GNU/Linux
How far that little candle throws his beams! So shines a good deed
in a naughty world. = Shakespeare. The Merchant of Venice
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Re: [CentOS-announce] Impact of the Debian OpenSSL vulnerability

2008-05-18 Thread Daniel de Kok
On Sun, May 18, 2008 at 7:55 PM, Stephen John Smoogen [EMAIL PROTECTED] wrote:
 I don't think either Red Hat or OpenSSH are going to do much with
 this. From what I have been told the search for bad ssh items if used
 inside of SSH slows down connections quite a bit because it does a
 search through the 1.5 MB space everything you connect. However, that
 could have been fixed with a quicker search algorithm by now

It uses binary search, so O(log n). Should be fast enough...

-- Daniel
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Re: [CentOS-announce] Impact of the Debian OpenSSL vulnerability

2008-05-17 Thread Ralph Angenendt
Karanbir Singh wrote:
 Dag pointed out that Suse is also considering setting up a blacklist of
 this nature. I dont mind looking at something like this within CentOS if
 someone wants to make a case for it. Would it be better to just have
 some tool ( Daniel already brought that up! ) that could audit setups
 instead of running such a blacklist ?

The problem is that the tools I know only look for broken ssh keys
(dowkd.pl, ssh-vulnkey) and none of them address other problematic areas
like certificates, dnssec-keys (although Lutz Donnerhacke mailed all
people running zones with broken keys) and so on. 

If you take a look at http://debian.wideopenssl.org/ there are so many
applications which might have broken keys even on non-Debian systems
that I think offering a tool for just ssh keys might give people a wrong
sense of security, if they don't find broken ssh keys on their machines.

Ralph


pgpqMfqoTNKwh.pgp
Description: PGP signature
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Re: [CentOS-announce] Impact of the Debian OpenSSL vulnerability

2008-05-17 Thread Daniel de Kok
On Sat, May 17, 2008 at 12:25 PM, Ralph Angenendt
[EMAIL PROTECTED] wrote:
 If you take a look at http://debian.wideopenssl.org/ there are so many
 applications which might have broken keys even on non-Debian systems
 that I think offering a tool for just ssh keys might give people a wrong
 sense of security, if they don't find broken ssh keys on their machines.

People often mistake tools for facts. Just like rootkit detection
utilities, people should realize that key detection is just a tool to
assist with finding obvious compromises. I think it is ok, to provide
one of these detection tools through the -extras repository, as long
as it is made clear in the documentation what it detects, what it does
not detect, and whether there is a chance of having false-positives.

Wrt. fingerprint-based blocking in OpenSSH:

- What does our upstream think about this?
- What do the OpenSSH developers think about this?

I think a general scheme for blocking certain public keys might be
useful, even outside this specific case. But I am not sure it is a
good idea to make/use vendor-specific extensions.

Take care,
Daniel
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Re: [CentOS-announce] Impact of the Debian OpenSSL vulnerability

2008-05-17 Thread Karanbir Singh

Daniel de Kok wrote:

- What does our upstream think about this?
- What do the OpenSSH developers think about this?


Someone is going to need to ask those questions of the people...

--
Karanbir Singh : http://www.karan.org/  : [EMAIL PROTECTED]
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Re: [CentOS-announce] Impact of the Debian OpenSSL vulnerability

2008-05-16 Thread Karanbir Singh
Chris Butler wrote:
 In addition to the fixed OpenSSL packages, Debian also released an update to
 OpenSSH that includes a blacklist of the weak keys. With this update, any
 connections attempting to authenticate with a weak key are rejected. There's
 also a utility which searches through user ~/.ssh directories for
 blacklisted keys.
 
 This blacklist would help in securing non-Debian systems as well. Are there
 any plans to include this ssh update in CentOS? 

Dag pointed out that Suse is also considering setting up a blacklist of
this nature. I dont mind looking at something like this within CentOS if
someone wants to make a case for it. Would it be better to just have
some tool ( Daniel already brought that up! ) that could audit setups
instead of running such a blacklist ?

Imho, the CentOS team would be open at looking at anything that helps
improve security for the users. And lets also keep an eye on what comes
down from upstream. But till such time as there is an upstream release
to address this issue ( if at all ) nothing stops us from providing the
resources required.

-- 
Karanbir Singh : http://www.karan.org/ : [EMAIL PROTECTED]
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos