Re: [CentOS] OpenSSL/SSH Bug on Debian - Compromised key pairs

2008-05-15 Thread Daniel de Kok
On Thu, May 15, 2008 at 12:20 AM, Clint Dilks [EMAIL PROTECTED] wrote: I know this may seem off topic, but I thought for those of us who might have Debian users generating key pairs that they put on CentOS systems people should be aware that everybody who generated a public/private keypair or

Re: [CentOS] OpenSSL/SSH Bug on Debian - Compromised key pairs

2008-05-15 Thread Daniel de Kok
On Thu, May 15, 2008 at 2:19 PM, Daniel de Kok [EMAIL PROTECTED] wrote: Yes, it is very important to follow up on this issue as soon as you can (now) to see if any of your keys or those of your users are affected. Additionally, it should be noted that in the case of *DSA* keys, this can even

Re: [CentOS] OpenSSL/SSH Bug on Debian - Compromised key pairs

2008-05-15 Thread Ned Slider
Daniel de Kok wrote: Furthermore, all DSA keys ever used on affected Debian systems for signing or authentication purposes should be considered compromised; the Digital Signature Algorithm relies on a secret random value used during signature generation. Take care, Daniel SANS have more on

Re: [CentOS] OpenSSL/SSH Bug on Debian - Compromised key pairs

2008-05-15 Thread MHR
On Thu, May 15, 2008 at 5:27 AM, Daniel de Kok [EMAIL PROTECTED] wrote: Jikes, rereading this, this does not seem accurate at all. Let me just quote the advisory: Furthermore, all DSA keys ever used on affected Debian systems for signing or authentication purposes should be considered

[CentOS] OpenSSL/SSH Bug on Debian - Compromised key pairs

2008-05-14 Thread Clint Dilks
Hi People, I know this may seem off topic, but I thought for those of us who might have Debian users generating key pairs that they put on CentOS systems people should be aware that everybody who generated a public/private keypair or an SSL cert request on Debian or Ubuntu from 2006 on is

Re: [CentOS] OpenSSL/SSH Bug on Debian - Compromised key pairs

2008-05-14 Thread Ned Slider
Clint Dilks wrote: Hi People, I know this may seem off topic, but I thought for those of us who might have Debian users generating key pairs that they put on CentOS systems people should be aware that everybody who generated a public/private keypair or an SSL cert request on Debian or