Re: Grave apache dos possible through byterange requests

2011-08-26 Thread Dirk-Willem van Gulik
On 26 aug. 2011, at 13:22, linbloke wrote: I'm curious as to why you suggest option 2 over option 1 from the Apache advisory? My guess is that it is compatible with version 1.3 and 2.x and that is has stronger enforcement of the syntax (by requiring ^bytes=) rather than just 5 comma

Re: dowkd.pl false positives

2008-05-23 Thread Dirk-Willem van Gulik
On May 23, 2008, at 3:13 PM, Florian Weimer wrote: * Dirk-Willem van Gulik: Perhaps confusion over false negatives - as the current ring does not include all endian/cpu flavours - it is possible (currently) for it to return no compromised keys - while there are in fact some. Could

Re: openssl-blacklist two keys per one pid

2008-05-21 Thread Dirk-Willem van Gulik
On May 21, 2008, at 12:06 PM, Bodo Moeller wrote: A more elaborate explanation seems in place to make sure that we avoid uninentionally incomplete blacklists. .. I'd expect there to be some significant overlapping between the blacklists, but these should still be different lists: Many RSA

Re: openssl-blacklist two keys per one pid

2008-05-20 Thread Dirk-Willem van Gulik
On May 19, 2008, at 9:52 PM, Jan Tomasek Florian Weimer wrote: I do not trust dowkd.pl script because it lacks info where keys were taken. ... We did not want to publish this information in order to give system. Do bear in mind that the public key consists of 1) the modulus and 2) the

Re: openssl-blacklist two keys per one pid

2008-05-19 Thread Dirk-Willem van Gulik
On May 19, 2008, at 2:17 PM, Florian Weimer wrote: The rule is simple. When the ~/.rnd file doesn't exist I get one key and in other situation I get another (that listed in Ubuntu openssl-blacklist) key. Because of this problem openssl-blacklist has to be twice big than openssh-blacklist.

Re: openssl-blacklist two keys per one pid

2008-05-19 Thread Dirk-Willem van Gulik
On May 19, 2008, at 2:54 PM, Florian Weimer wrote: * Dirk-Willem van Gulik: One way to do this a bit more careful may be by comparing the actual data itself. OpenSSL will output this with the modulus flag: openssl genrsa 1024 | openssl rsa -noout -modulus Yes, that's what dowkd

Re: openssl-blacklist two keys per one pid

2008-05-19 Thread Dirk-Willem van Gulik
On May 19, 2008, at 3:15 PM, Florian Weimer wrote: * Dirk-Willem van Gulik: Working with the original and some indication as to what pid, platform, keylen endianness, and .rnd, is useful - as that way it is possible to understand, reconstruct, spotcheck or verify in-situ - rather than having

Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-19 Thread Dirk-Willem van Gulik
On May 17, 2008, at 1:34 PM, Matteo Vescovi wrote: are there updates for this issue for old stable - sarge? It was said sarge is not affected, Bear in mind that you still want blacklist support for the various tools, not just for the known_hosts and authorized_keys; but also for

Re: dowkd.pl false positives

2008-05-19 Thread Dirk-Willem van Gulik
On May 17, 2008, at 2:23 PM, Florian Weimer wrote: Someone has added a warning to the wiki page http://wiki.debian.org/SSLkeys that dowdkd.pl produces many false positives. Even if there are bugs in the script, this is *very* unlikely. Could someone please provide such an alleged false

Fault in openssl-blacklist - version 0.1 -- false negatives.

2008-05-16 Thread Dirk-Willem van Gulik
Just FYI - there seems a minor fault in the openssl-blackist tool[1], I strongly suspect that the line: #print bits: %s\nmodulus: %s\nkey: %s\nkey80: %s % (bits, modulus, key, key[20:]) if key[20:] in db_lines: needs to be key = sha.sha(modulus).hexdigest() #print bits:

Minor improvement to openssl-blacklist

2008-05-16 Thread Dirk-Willem van Gulik
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 The diff below lets one not just check the private keys - but also check the public part thereof. This is useful - as the latter can also be obtained with: openssl s_client -connect fqdn:443 -showcerts or be ran over a store, say the

Fault in openssl-blacklist - version 0.1 -- false negatives.

2008-05-16 Thread Dirk-Willem van Gulik
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Just FYI - there seems a minor fault in the openssl-blackist tool[1], I strongly suspect that the line: #print bits: %s\nmodulus: %s\nkey: %s\nkey80: %s % (bits, modulus, key, key[20:]) if key[20:] in db_lines: needs to be key =

Re: Fault in openssl-blacklist - version 0.1 -- false negatives.

2008-05-16 Thread Dirk-Willem van Gulik
On May 16, 2008, at 12:48 PM, Dirk-Willem van Gulik wrote: Just FYI - there seems a minor fault in the openssl-blackist tool, I strongly suspect After discussing this with Jamie - two things - First note that above is NOT the case provided that you used [1] or more recent