Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-06-08 Thread Jens Schüßler
* Andrew McGlashan [EMAIL PROTECTED] wrote: Hi, Florian Weimer wrote: Affected keys include SSH keys, OpenVPN keys, DNSSEC keys, and key material for use in X.509 certificates and session keys used in SSL/TLS connections. Keys generated with GnuPG or GNUTLS are not affected, though. So

Re: [Pkg-openssl-devel] [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-20 Thread Christoph Martin
The Ubuntu openssl maintainers released a openssl-blacklist equivalent to the openssh-blacklist package. It includes a blacklist with compromised openssl key hashes and a program with a openssl-vulnkey program suitable to test your openssl key files. I think it would be a good think to

Re: [Pkg-openssl-devel] [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-20 Thread Christoph Martin
Hi Alberto, Alberto Gonzalez Iniesta schrieb: On Mon, May 19, 2008 at 01:13:46PM +0200, Christoph Martin wrote: The Ubuntu openssl maintainers released a openssl-blacklist equivalent to the openssh-blacklist package. It includes a blacklist with compromised openssl key hashes and a program

Re: [Pkg-openssl-devel] [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-20 Thread Alberto Gonzalez Iniesta
On Tue, May 20, 2008 at 04:48:43PM +0200, Christoph Martin wrote: Hi Alberto, Alberto Gonzalez Iniesta schrieb: On Mon, May 19, 2008 at 01:13:46PM +0200, Christoph Martin wrote: The Ubuntu openssl maintainers released a openssl-blacklist equivalent to the openssh-blacklist package. It

Re: [Pkg-openssl-devel] [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-20 Thread Christoph Martin
Hi Alberto, Alberto Gonzalez Iniesta schrieb: The package is being build by its original author (Jamie) and everything got started when the OpenVPN maintainer (me) decided to add secret/key file validation like the one on the Ubuntu package. Since those validations required

Re: [Pkg-openssl-devel] [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-20 Thread Kees Cook
Hi Christoph, On Tue, May 20, 2008 at 05:56:56PM +0200, Christoph Martin wrote: Alberto Gonzalez Iniesta schrieb: The package is being build by its original author (Jamie) and everything got started when the OpenVPN maintainer (me) decided to add secret/key file validation like the one on

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-19 Thread Andreas Bunten
Hi, you wrote: (...) A detector for known weak key material will be published at: http://security.debian.org/project/extra/dowkd/dowkd.pl.gz http://security.debian.org/project/extra/dowkd/dowkd.pl.gz.asc (OpenPGP signature) (...) Thank you for providing a perl script to check for

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-19 Thread Dirk-Willem van Gulik
On May 17, 2008, at 1:34 PM, Matteo Vescovi wrote: are there updates for this issue for old stable - sarge? It was said sarge is not affected, Bear in mind that you still want blacklist support for the various tools, not just for the known_hosts and authorized_keys; but also for

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-17 Thread Matteo Vescovi
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/17/2008 12:55 PM, Dimitar Dobrev wrote: Hi group, are there updates for this issue for old stable - sarge? It was said sarge is not affected, iirc. Greetings, mfv - -- Matteo F. Vescovi System Administrator Studio Vescovi

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-17 Thread Jens Schüßler
* Dimitar Dobrev [EMAIL PROTECTED] wrote: Hi group, are there updates for this issue for old stable - sarge? You should read what you quote: The first vulnerable version, 0.9.8c-1, was uploaded to the unstable distribution on 2006-09-17, and has since propagated to the testing and

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-17 Thread Martin Marcher
Hi, On Sat, May 17, 2008 at 12:55 PM, Dimitar Dobrev [EMAIL PROTECTED] wrote: Hi group, are there updates for this issue for old stable - sarge? The first vulnerable version, 0.9.8c-1, was uploaded to the unstable distribution on 2006-09-17, and has since propagated to the testing and

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-17 Thread Nico Golde
Hi Dimitar, * Dimitar Dobrev [EMAIL PROTECTED] [2008-05-17 13:48]: are there updates for this issue for old stable - sarge? sarge is not affected and besides that the security support for sarge ended quite some time ago. cheers nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] -

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-17 Thread Florian Weimer
* Henrique de Moraes Holschuh: It's not so much a time issue, is a question of storage (or getting that data to the OpenSSH server). A networked service would be feasible, but it would also allow some sort of traffic analysis. I did mean putting a lot of brain grease on it. Math might

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-17 Thread Vincent Bernat
OoO En ce début d'après-midi nuageux du samedi 17 mai 2008, vers 14:15, Nico Golde [EMAIL PROTECTED] disait: are there updates for this issue for old stable - sarge? sarge is not affected I suppose that people may still be interested in blacklist support. and besides that the security

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-17 Thread Nico Golde
Hi Vincent, * Vincent Bernat [EMAIL PROTECTED] [2008-05-17 21:12]: OoO En ce début d'après-midi nuageux du samedi 17 mai 2008, vers 14:15, Nico Golde [EMAIL PROTECTED] disait: are there updates for this issue for old stable - sarge? sarge is not affected I suppose that people may

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-14 Thread Yves-Alexis Perez
On mar, 2008-05-13 at 23:39 -0300, Henrique de Moraes Holschuh wrote: It is probably worth a lot of effort to fully map the entire set of keys the broken openssl could generate, and find a very fast way to check if a key belong to that set. And add that to openssl upstream (to

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-14 Thread Rene Mayrhofer
On Dienstag, 13. Mai 2008, Vincent Bernat wrote: - As a maintainer of a package that have generated certificates using OpenSSL, how should we handle the issue? I'm in the same situation (maintaining openswan and strongswan, and both packages may automatically create X.509 certificates in

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-14 Thread Gerfried Fuchs
Am Mittwoch, den 14.05.2008, 09:35 +0200 schrieb Rene Mayrhofer: rm /etc/ssh/ssh_host_* dpkg-reconfigure openssh-server /etc/init.d/ssh restart FWIW, the dpkg-reconfigure openssh-server does the restart implicitly, you don't need to explicitly do a restart afterwards, again. Who is

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-14 Thread Sam Morris
On Wed, 14 May 2008 07:59:58 +0200, Yves-Alexis Perez wrote: On mar, 2008-05-13 at 23:39 -0300, Henrique de Moraes Holschuh wrote: It is probably worth a lot of effort to fully map the entire set of keys the broken openssl could generate, and find a very fast way to check if a key belong

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-14 Thread Florian Weimer
* Sam Morris: I agree it would be neat if someone with a powerful machine could generate all possible keys. I don't know how long that would take however... It's not so much a time issue, is a question of storage (or getting that data to the OpenSSH server). A networked service would be

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-14 Thread nicolas vigier
On Wed, 14 May 2008, Sam Morris wrote: Not quite... Once the update is applied, weak user keys will be automatically rejected where possible (though they cannot be detected in all cases). I agree it would be neat if someone with a powerful machine could generate all possible keys. I

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-14 Thread Henrique de Moraes Holschuh
On Wed, 14 May 2008, Florian Weimer wrote: I agree it would be neat if someone with a powerful machine could generate all possible keys. I don't know how long that would take however... It's not so much a time issue, is a question of storage (or getting that data to the OpenSSH

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Philipp Kern
On Tue, May 13, 2008 at 02:06:39PM +0200, Florian Weimer wrote: A detector for known weak key material will be published at: http://security.debian.org/project/extra/dowkd/dowkd.pl.gz http://security.debian.org/project/extra/dowkd/dowkd.pl.gz.asc (OpenPGP signature) On stable I get

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Marcin Owsiany
On Tue, May 13, 2008 at 02:06:39PM +0200, Florian Weimer wrote: It is strongly recommended that all cryptographic key material which has been generated by OpenSSL versions starting with 0.9.8c-1 on Debian systems is recreated from scratch. Does openssh store the generation date in the SSH

Re: Broken link on Debian CVE Web page (Was: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Cyril Brulebois
On 13/05/2008, Stephane Bortzmeyer wrote: By the way, the page http://www.debian.org/security/cve-compatibility has a link http://security-tracker.debian.org/, labeled The Debian Security Tracker has the canonical list of CVE names, corresponding Debian packages, and this link is broken:

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Florian Weimer
* Dominic Hargreaves: On Tue, May 13, 2008 at 02:06:39PM +0200, Florian Weimer wrote: http://security.debian.org/project/extra/dowkd/dowkd.pl.gz.asc (OpenPGP signature) This URL 404s (but the tool URL doesn't... possibly encouraging bad practice in running unverified code) Yeah,

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Florian Weimer
* Marcin Owsiany: On Tue, May 13, 2008 at 02:06:39PM +0200, Florian Weimer wrote: It is strongly recommended that all cryptographic key material which has been generated by OpenSSL versions starting with 0.9.8c-1 on Debian systems is recreated from scratch. Does openssh store the generation

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread daniel
very bad news On Tue, 13 May 2008 14:06:39 +0200, Florian Weimer [EMAIL PROTECTED] wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1571-1 [EMAIL PROTECTED]

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Vladislav Kurz
On Tuesday 13 of May 2008, Dominic Hargreaves wrote: On Tue, May 13, 2008 at 02:06:39PM +0200, Florian Weimer wrote: http://security.debian.org/project/extra/dowkd/dowkd.pl.gz.asc (OpenPGP signature) This URL 404s (but the tool URL doesn't... possibly encouraging bad practice in

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Daniel Leidert
Am Dienstag, den 13.05.2008, 16:02 +0200 schrieb Daniel Leidert: Am Dienstag, den 13.05.2008, 15:27 +0200 schrieb Philipp Kern: On Tue, May 13, 2008 at 02:06:39PM +0200, Florian Weimer wrote: A detector for known weak key material will be published at:

Re: Broken link on Debian CVE Web page (Was: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Stephane Bortzmeyer
On Tue, May 13, 2008 at 03:44:24PM +0200, Cyril Brulebois [EMAIL PROTECTED] wrote a message of 31 lines which said: By the way, the page http://www.debian.org/security/cve-compatibility has a link http://security-tracker.debian.org/, labeled The Debian Security Tracker has the

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Philipp Kern
On Tue, May 13, 2008 at 04:17:03PM +0200, Florian Weimer wrote: The $db-close call is wrong, you can just remove it, or download the new version (where this should be fixed). Works now, thanks. Kind regards, Philipp Kern -- .''`. Philipp Kern Debian Developer :

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Nicolas Rachinsky
* Florian Weimer [EMAIL PROTECTED] [2008-05-13 14:06 +0200]: Luciano Bello discovered that the random number generator in Debian's openssl package is predictable. This is caused by an incorrect Debian-specific change to the openssl package (CVE-2008-0166). As a result, cryptographic key

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Florian Weimer
* Nicolas Rachinsky: The diffs http://svn.debian.org/viewsvn/pkg-openssl/openssl/trunk/rand/md_rand.c?rev=141view=diffr1=141r2=140p1=openssl/trunk/rand/md_rand.cp2=/openssl/trunk/rand/md_rand.c and

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Daniel Leidert
Am Dienstag, den 13.05.2008, 15:27 +0200 schrieb Philipp Kern: On Tue, May 13, 2008 at 02:06:39PM +0200, Florian Weimer wrote: A detector for known weak key material will be published at: http://security.debian.org/project/extra/dowkd/dowkd.pl.gz

Re: Broken link on Debian CVE Web page (Was: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Gerfried Fuchs
Am Dienstag, den 13.05.2008, 15:51 +0200 schrieb Stephane Bortzmeyer: On Tue, May 13, 2008 at 03:44:24PM +0200, packages, and this link is broken: there is no security-tracker.debian.org. Just in case you don't know about it yet, try .net. Nice and useful but the Web page should be

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Michel Messerschmidt
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Florian Weimer said: The first vulnerable version, 0.9.8c-1, was uploaded to the unstable distribution on 2006-09-17, and has since propagated to the testing and current stable (etch) distributions. The old stable distribution (sarge) is not

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Jan Luehr
Hello, Am Dienstag, 13. Mai 2008 schrieb [EMAIL PROTECTED]: [] openssl - predictable random number generator very bad news indeed - since I have to chip certificates for multiple OpenVPN networks :( (This time, I'll do it on OpenBSD ;) However, I'm curious: I could this happen? (Although

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Vincent Bernat
OoO En ce début d'après-midi nuageux du mardi 13 mai 2008, vers 14:06, Florian Weimer [EMAIL PROTECTED] disait: Package: openssl Vulnerability : predictable random number generator Some other random questions: - It seems that firefox does not handle CRL unless manually imported,

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread paddy
On Tue, May 13, 2008 at 07:38:27PM +, Sam Morris wrote: On Tue, 13 May 2008 21:29:53 +0200, Vincent Bernat wrote: - It seems that firefox does not handle CRL unless manually imported, correct? This means that in most cases already issued certificates are still vulnerable

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Jan Luehr
Hello, Am Dienstag, 13. Mai 2008 schrieb Vincent Bernat: OoO En ce début d'après-midi nuageux du mardi 13 mai 2008, vers 14:06, Florian Weimer [EMAIL PROTECTED] disait: Package: openssl Vulnerability : predictable random number generator Some other random questions: - It

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread John Keimel
On Tue, May 13, 2008 at 3:52 PM, Jan Luehr [EMAIL PROTECTED] wrote: For the last question, I see several solutions: - the user has to read the DSA and handle it himself Since some keys are generated automatically, (e.g. ssh host keys) users will have to regenerate keys,they haven't

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Vincent Bernat
OoO En cette soirée bien amorcée du mardi 13 mai 2008, vers 22:21, John Keimel [EMAIL PROTECTED] disait: Since some keys are generated automatically, (e.g. ssh host keys) users will have to regenerate keys,they haven't generated in the first place and might not be aware of their existens.

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Corey Hickey
Jan Luehr wrote: Hello, Am Dienstag, 13. Mai 2008 schrieb Corey Hickey: Jan Luehr wrote: Hello, Am Dienstag, 13. Mai 2008 schrieb Vincent Bernat: OoO En ce début d'après-midi nuageux du mardi 13 mai 2008, vers 14:06, Florian Weimer [EMAIL PROTECTED] disait: Package: openssl

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread John Keimel
On Tue, May 13, 2008 at 4:31 PM, Vincent Bernat [EMAIL PROTECTED] wrote: OoO En cette soirée bien amorcée du mardi 13 mai 2008, vers 22:21, John Keimel [EMAIL PROTECTED] disait: Since some keys are generated automatically, (e.g. ssh host keys) users will have to regenerate keys,they

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Jan Luehr
Hello, Am Dienstag, 13. Mai 2008 schrieb Corey Hickey: Jan Luehr wrote: Hello, Am Dienstag, 13. Mai 2008 schrieb Vincent Bernat: OoO En ce début d'après-midi nuageux du mardi 13 mai 2008, vers 14:06, Florian Weimer [EMAIL PROTECTED] disait: Package: openssl

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Corey Hickey
Jan Luehr wrote: Hello, Am Dienstag, 13. Mai 2008 schrieb Vincent Bernat: OoO En ce début d'après-midi nuageux du mardi 13 mai 2008, vers 14:06, Florian Weimer [EMAIL PROTECTED] disait: Package: openssl Vulnerability : predictable random number generator Some other random

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Vincent Bernat
OoO En cette soirée bien amorcée du mardi 13 mai 2008, vers 22:38, John Keimel [EMAIL PROTECTED] disait: Restarting OpenSSH do not close existing connections. Yes, that's correct. I agree. But the instructions I saw were for 'shutting down the SSHD server' - not just 'restarting it'.

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Jan Luehr
Hello, Am Dienstag, 13. Mai 2008 schrieb John Keimel: On Tue, May 13, 2008 at 4:31 PM, Vincent Bernat [EMAIL PROTECTED] wrote: OoO En cette soirée bien amorcée du mardi 13 mai 2008, vers 22:21, John Keimel [EMAIL PROTECTED] disait: Since some keys are generated automatically, (e.g.

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread dererk
On Tue, May 13, 2008 at 10:53:25PM +0200, Jan Luehr wrote: rm /etc/ssh/ssh_host_* ssh-keygen -t dsa -f /etc/ssh/ssh_host_dsa_key -N '' ssh-keygen -t rsa -f /etc/ssh/ssh_host_rsa_key -N '' /etc/init.d/ssh restart - job done. Keep smiling yanosz Shorter one: rm /etc/ssh/ssh_host_*

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Raj Gurung
On May 13, 2008, at 2:35 PM, dererk wrote: On Tue, May 13, 2008 at 10:53:25PM +0200, Jan Luehr wrote: rm /etc/ssh/ssh_host_* ssh-keygen -t dsa -f /etc/ssh/ssh_host_dsa_key -N '' ssh-keygen -t rsa -f /etc/ssh/ssh_host_rsa_key -N '' /etc/init.d/ssh restart - job done. Keep smiling yanosz

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread Nick Boyce
Jan Luehr wrote: However, I'm curious: [how] could this happen? This is the best explanation I've seen so far : http://it.slashdot.org/comments.pl?sid=551636cid=23392602 I have no idea if it's correct, but it sounds very plausible. If there was any mistake it may have been to try too hard