Re: [SLUG] Anyone else having problems with Ubuntu's latest openvpn?

2008-05-15 Thread John Clarke
On Thu, May 15, 2008 at 07:39:01 +1000, Mary Gardiner wrote:

 I haven't tried OpenVPN yet, but a new security advisory came out this
 morning saying A regression was introduced in OpenVPN when using TLS
 and multi-client/server which caused OpenVPN to not start when using
 valid SSL certificates... It was also found that openssl-vulnkey from

That was it.  I've applied the latest update and my vpn now works 
again :-)

Now, does anyone know why, if the problem is that only the 15-bit PID
was used for entropy when these vulnerable keys were generated, the
blacklists contain more than 2^15 keys?  The 2048-bit RSA and 1024-bit
DSA blacklists each have 98307 entries, and the openvpn blacklist has
98304.  H.D. Moore's lists of ssh keys contain only 32K keys each, as
I'd expect (http://metasploit.com/users/hdm/tools/debian-openssl/).

The reason I ask is that I've generated 32K limited-entropy 1024-bit
RSA keys for a blacklist to check some keys we use internally (although
it's extremely unlikely any of them were generated on a vulnerable
system), and I was wondering if I should be generating more somehow.
And if anyone wants my blacklist, let me know  I'll make it available.


Thanks,

John
-- 
I've had attacks of diarrhea that were cleaner than VisualBasic.
-- Lionel Lauer
-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


[SLUG] Debian SSH vulnerability: act now!

2008-05-15 Thread Peter Chubb

Just in case anyone missed it, there's been a major vulnerability for
any SSH keys generated on a debian system over the last two years or
so ... apparently the random number generator wasn't being seeded
right, so only a few distinct keys were actually generated.

The AARNET mirror doesn't have the updated packages as of this
morning, but the Optusnet mirror does ... I suggest that
 -- you install the new openssh-client package (version 1:4.7p1-9 on unstable)
 -- run ssh-vulnkey -a as root to find any vulnerable keys, and get
your users to fix them.


--
Dr Peter Chubb  http://www.gelato.unsw.edu.au  peterc AT gelato.unsw.edu.au
http://www.ertos.nicta.com.au   ERTOS within National ICT Australia
-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


Re: [SLUG] Debian SSH vulnerability: act now!

2008-05-15 Thread Jeff Waugh
quote who=Peter Chubb

 Just in case anyone missed it, there's been a major vulnerability for
 any SSH keys generated on a debian system over the last two years or
 so ... apparently the random number generator wasn't being seeded
 right, so only a few distinct keys were actually generated.
 
 The AARNET mirror doesn't have the updated packages as of this
 morning, but the Optusnet mirror does ... I suggest that
  -- you install the new openssh-client package (version 1:4.7p1-9 on unstable)
  -- run ssh-vulnkey -a as root to find any vulnerable keys, and get
 your users to fix them.

... and anyone running a machine that accepts ssh key authentication, even
if it's not running Debian, has to care about this. Check the keys that are
being used to authenticate to your hosts, and consider your recovery options
carefully given that we can't detect all of the vulnerable keys.

- Jeff

-- 
OSCON 2008: Portland OR, USA   http://conferences.oreilly.com/oscon/
 
GNOME, launched specifically to counter a threat to our freedom, is
   the free software project par excellence. - Richard Stallman
-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


Re: [SLUG] Debian SSH vulnerability: act now!

2008-05-15 Thread Alex Samad
On Fri, May 16, 2008 at 09:24:00AM +1000, Peter Chubb wrote:
 
 Just in case anyone missed it, there's been a major vulnerability for
 any SSH keys generated on a debian system over the last two years or
 so ... apparently the random number generator wasn't being seeded
 right, so only a few distinct keys were actually generated.
 
 The AARNET mirror doesn't have the updated packages as of this
 morning, but the Optusnet mirror does ... I suggest that
  -- you install the new openssh-client package (version 1:4.7p1-9 on unstable)
  -- run ssh-vulnkey -a as root to find any vulnerable keys, and get
 your users to fix them.

This also includes any certificates created by openssl (apache, exim,
postfix). its a pain but

this is a link to the ubunto ssl checker 
https://launchpad.net/ubuntu/+source/openssl-blacklist/


 
 
 --
 Dr Peter Chubb  http://www.gelato.unsw.edu.au  peterc AT gelato.unsw.edu.au
 http://www.ertos.nicta.com.au   ERTOS within National ICT Australia
 -- 
 SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
 Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
 

-- 
Better dead than mellow.


signature.asc
Description: Digital signature
-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Re: [SLUG] Debian SSH vulnerability: act now!

2008-05-15 Thread Adam Kennedy
For people not using debian, the ssh-vulnkey logic has been repackaged 
with dependencies as a CPAN distribution and should be installable 
anywhere that has a Perl installation, including on Windows using 
Strawberry Perl (http://strawberryperl.com).


http://search.cpan.org/dist/Dowse-BadSSH/

The package is going through a couple of releases a day as it gets 
tweaked and cross-platform bugs are excised, so if you have any 
difficulties with it, wait 24 hours or so and try again.


Adam K

Peter Chubb wrote:

Just in case anyone missed it, there's been a major vulnerability for
any SSH keys generated on a debian system over the last two years or
so ... apparently the random number generator wasn't being seeded
right, so only a few distinct keys were actually generated.

The AARNET mirror doesn't have the updated packages as of this
morning, but the Optusnet mirror does ... I suggest that
 -- you install the new openssh-client package (version 1:4.7p1-9 on unstable)
 -- run ssh-vulnkey -a as root to find any vulnerable keys, and get
your users to fix them.


--
Dr Peter Chubb  http://www.gelato.unsw.edu.au  peterc AT gelato.unsw.edu.au
http://www.ertos.nicta.com.au   ERTOS within National ICT Australia
  


--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


Re: [SLUG] Debian SSH vulnerability: act now!

2008-05-15 Thread Dave Kempe

Peter Chubb wrote:

Just in case anyone missed it, there's been a major vulnerability for
any SSH keys generated on a debian system over the last two years or
so ... apparently the random number generator wasn't being seeded
right, so only a few distinct keys were actually generated.

  


For ubuntu systems, dapper is not affected, so aside from compromised 
keys being introduced there, if you are on LTS, you should be mostly OK. 
But check anyway.

What a pain in the arse eh

dave
--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


[SLUG] Minimum username length?

2008-05-15 Thread DaZZa
Folks.

Anyone know if there is a default minimum username length for some (or
all) current Linux distros?

I have a vague recall from somewhere it's 4 characters minimum - but
can't find any documentation to back this up.

DaZZa
-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


Re: [SLUG] Minimum username length?

2008-05-15 Thread Peter Hardy
On Fri, 2008-05-16 at 14:35 +1000, DaZZa wrote:
 Anyone know if there is a default minimum username length for some (or
 all) current Linux distros?
 
 I have a vague recall from somewhere it's 4 characters minimum - but
 can't find any documentation to back this up.

My copy of O'Reilly's Practical UNIX and Internet Security (3rd edition)
says that standard passwords are 1-8 characters, although modern systems
will allow longer.

Most of my work involves debian, and RHEL of varying ages. They all have
system users with short names (bin, sys, lp and the like). The only time
I've seen a single-character username was one added by a dodgy rootkit.

-- 
Pete

-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


Re: [SLUG] Debian SSH vulnerability: act now!

2008-05-15 Thread Martin Visser
And what has barely rated a mention is that anything you may have
transmitted using SSH or SSL encryption  using aforesaid weak keys may
also be vulnerable to easy decryption. While a long shot, if someone
has managed to capture whole packet traces of such a conversation, it
might be a relatively easy (compared to using non-weak keys) brute
force exercise to decode the traffic simply by trying all of the 32767
possible weak keys (this applies to SSH - not sure about SSL - though
for self-signed certificates it could well be the same level of risk).

Of course, capturing traffic between client and server across the
internet is not easy unless the bad guys are located in a carrier and
an ISP, so the risk here is probably quite small.

Regards, Martin

On Fri, May 16, 2008 at 9:30 AM, Jeff Waugh [EMAIL PROTECTED] wrote:
 quote who=Peter Chubb

 Just in case anyone missed it, there's been a major vulnerability for
 any SSH keys generated on a debian system over the last two years or
 so ... apparently the random number generator wasn't being seeded
 right, so only a few distinct keys were actually generated.

 The AARNET mirror doesn't have the updated packages as of this
 morning, but the Optusnet mirror does ... I suggest that
  -- you install the new openssh-client package (version 1:4.7p1-9 on 
 unstable)
  -- run ssh-vulnkey -a as root to find any vulnerable keys, and get
 your users to fix them.

 ... and anyone running a machine that accepts ssh key authentication, even
 if it's not running Debian, has to care about this. Check the keys that are
 being used to authenticate to your hosts, and consider your recovery options
 carefully given that we can't detect all of the vulnerable keys.

 - Jeff

 --
 OSCON 2008: Portland OR, USA   http://conferences.oreilly.com/oscon/

GNOME, launched specifically to counter a threat to our freedom, is
   the free software project par excellence. - Richard Stallman
 --
 SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
 Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html




-- 
Regards, Martin

Martin Visser
-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


Re: [SLUG] Debian SSH vulnerability: act now!

2008-05-15 Thread Peter Hardy
On Fri, 2008-05-16 at 09:24 +1000, Peter Chubb wrote:
 Just in case anyone missed it, there's been a major vulnerability for
 any SSH keys generated on a debian system over the last two years or
 so ... apparently the random number generator wasn't being seeded
 right, so only a few distinct keys were actually generated.

Today's XKCD sums up my feelings on the matter quite nicely.
http://xkcd.com/424/

-- 
Pete

-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


[SLUG] syntax color for div tags

2008-05-15 Thread Luke Vanderfluit

Hi.

Anyone know of a way to color matching div tags in html?
I use vim.


Kind regards.

--
Luke Vanderfluit
Analyst / Web Programmer
e3Learning.com.au
08 8221 6422
--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html