Re: Wider fallout from Debian issue?

2008-06-02 Thread Steffen DETTMER
* [EMAIL PROTECTED] wrote on Fri, May 30, 2008 at 06:51 -0500: Back in the day, DES was the de facto encryption algorithm. [...] In an ideal world, I think the system should throw an exception then and let the calling application feed it another key. However, I think the general consensus

Re: Wider fallout from Debian issue?

2008-06-02 Thread travis
On Thu, May 29, 2008 at 10:14:12AM -0400, Victor Duchovni wrote: And then knowing that attackers never choose these keys, users start using these keys because attakers avoid them, and then attackers start checking these first again, ... This way lies madness. Fix your premise and don't change

Re: Wider fallout from Debian issue?

2008-06-02 Thread Mathias Brossard
Yves Rutschle wrote: On Wed, May 28, 2008 at 07:55:35PM +1200, Deane Sloan wrote: Finally - how real is this concern? What is the probability that say a 2048bit generated key could fall into the 32,767 keys in the metasploit SSH example on unaffected systems? 32,768 = 2^15 number of 2048 bit

Re: Wider fallout from Debian issue?

2008-06-02 Thread Steffen DETTMER
* John Parker wrote on Sat, May 31, 2008 at 15:35 -0500: Probability that a proper key falls in the space of the bad debian keys: 2^15 / 2^2048 = 1 / 2^2033. That's a lot of zeros before the first non-zero digit. Put differently, if you were to start generating keys now at a rate of,

Re: Wider fallout from Debian issue?

2008-05-31 Thread Yves Rutschle
On Wed, May 28, 2008 at 07:55:35PM +1200, Deane Sloan wrote: Finally - how real is this concern? What is the probability that say a 2048bit generated key could fall into the 32,767 keys in the metasploit SSH example on unaffected systems? 32,768 = 2^15 number of 2048 bit keys: 2^2048

Re: Wider fallout from Debian issue?

2008-05-31 Thread John Parker
On Sat, May 31, 2008 at 2:32 PM, Yves Rutschle [EMAIL PROTECTED] wrote: On Wed, May 28, 2008 at 07:55:35PM +1200, Deane Sloan wrote: Finally - how real is this concern? What is the probability that say a 2048bit generated key could fall into the 32,767 keys in the metasploit SSH example on

Re: Wider fallout from Debian issue?

2008-05-31 Thread Victor Duchovni
On Sat, May 31, 2008 at 09:32:54PM +0200, Yves Rutschle wrote: On Wed, May 28, 2008 at 07:55:35PM +1200, Deane Sloan wrote: Finally - how real is this concern? What is the probability that say a 2048bit generated key could fall into the 32,767 keys in the metasploit SSH example on

Re: Wider fallout from Debian issue?

2008-05-30 Thread travis+ml-openssl
On Wed, May 28, 2008 at 08:01:11PM +0200, Ger Hobbelt wrote: Anything (such as passwords) which has been used on an *actual* 'compromized box' (be it one of 'those Debian' releases or otherwise) to _generate_ keys plus any keys _produced_ on such a compromised box must be eradicated and are

Re: Wider fallout from Debian issue?

2008-05-30 Thread travis+ml-openssl
On Thu, May 29, 2008 at 10:14:12AM -0400, Victor Duchovni wrote: And then knowing that attackers never choose these keys, users start using these keys because attakers avoid them, and then attackers start checking these first again, ... This way lies madness. Fix your premise and don't change

Re: Wider fallout from Debian issue?

2008-05-30 Thread travis+ml-openssl
On Wed, May 28, 2008 at 10:55:18PM -0700, David Schwartz wrote: Okay, I guess I give up. I now realize that I had no idea what you meant in your past few comments. What relevance do you think this notion of weak keys has to do with this issue, since you were the one who brought it up? The

Re: Wider fallout from Debian issue?

2008-05-30 Thread Geoff Thorpe
On Friday 30 May 2008 07:39:08 [EMAIL PROTECTED] wrote: I personally don't like the idea of generating keys that people will try, or using a weak/known key with small probability, but in this case I think it's so small that simply scanning for and banning such keys is good enough. I was

RE: Wider fallout from Debian issue?

2008-05-30 Thread Deane Sloan
On Friday 30 May 2008 07:39:08 [EMAIL PROTECTED] wrote: I personally don't like the idea of generating keys that people will try, or using a weak/known key with small probability, but in this case I think it's so small that simply scanning for and banning such keys is good enough. What

RE: Wider fallout from Debian issue?

2008-05-30 Thread David Schwartz
Travis wrote: Agreed. Let's assume that users tend to pick the password password when given a choice. Now adversaries try the most common password, namely password, first. Security conscious admins ban the word password as a password. Yes, this does reduce the keyspace a tiny bit. Do

Re: Wider fallout from Debian issue?

2008-05-29 Thread Ger Hobbelt
On Wed, May 28, 2008 at 6:47 PM, Deane Sloan [EMAIL PROTECTED] wrote: To tie this off - is it fair to say that the impact of say 2048bit RSA SSL(etc) using a private key in the affected range is a valid consideration/concern, however in combination with the likelihood stated, the overall risk

Re: Wider fallout from Debian issue?

2008-05-29 Thread Steffen DETTMER
* Victor Duchovni wrote on Wed, May 28, 2008 at 21:10 -0400: Only against random attacks of course, if all attackers first check these keys, then removing them strengthens the algorithm against (non-random) brute-force attack. This said, the effort of explicitly avoiding these is

Re: Wider fallout from Debian issue?

2008-05-29 Thread Victor Duchovni
On Thu, May 29, 2008 at 09:48:38AM +0200, Steffen DETTMER wrote: On the other hand, someone else could assume that all potentially weak keys are regenerated and the concerned (boxes, systems, admins, security professionals, ...) now are more sensitive, carefully exchanged all keys against,

RE: Wider fallout from Debian issue?

2008-05-29 Thread Mikhail Kruk
Only against random attacks of course, if all attackers first check these keys, then removing them strengthens the algorithm against (non-random) brute-force attack. This said, the effort of explicitly avoiding these is probably wasted (unless one suspects one has a identically weak RNG). --

Wider fallout from Debian issue?

2008-05-28 Thread Deane Sloan
Hi, Regarding the recently reported Debian patch of OpenSSL issue, the affected keys would seem to be well known and with the metasploit site hosting pre-computed keys and a number of scripts around various sites available to take advantage of the specific problem, it would seem like just a

Re: Wider fallout from Debian issue?

2008-05-28 Thread Victor Duchovni
On Wed, May 28, 2008 at 07:55:35PM +1200, Deane Sloan wrote: Finally - how real is this concern? What is the probability that say a 2048bit generated key could fall into the 32,767 keys in the metasploit SSH example on unaffected systems? This concern is unwarranted. -- Viktor.

RE: Wider fallout from Debian issue?

2008-05-28 Thread David Schwartz
Finally - how real is this concern? What is the probability that say a 2048bit generated key could fall into the 32,767 keys in the metasploit SSH example on unaffected systems? Best Regards, Deane If you think about it, it doesn't make sense. Suppose I include a randomish string in my

Re: Wider fallout from Debian issue?

2008-05-28 Thread Victor Duchovni
On Wed, May 28, 2008 at 08:09:16AM -0700, Michael Sierchio wrote: David Schwartz wrote: ... Suppose I include a randomish string in my message 46e8bd8ceae57f8b7af66536e7859bad. Any attacker might see this message -- it's public. So he can certainly try that string as your password. So

Re: Wider fallout from Debian issue?

2008-05-28 Thread Michael Sierchio
David Schwartz wrote: ... Suppose I include a randomish string in my message 46e8bd8ceae57f8b7af66536e7859bad. Any attacker might see this message -- it's public. So he can certainly try that string as your password. So will you now run off and add it to a blacklist, since it's clearly now a

RE: Wider fallout from Debian issue?

2008-05-28 Thread Deane Sloan
and kerosene... Thanks again, Deane -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Victor Duchovni Sent: Thursday, May 29, 2008 3:37 AM To: openssl-users@openssl.org Subject: Re: Wider fallout from Debian issue? On Wed, May 28, 2008 at 08:09:16AM -0700

Re: Wider fallout from Debian issue?

2008-05-28 Thread Steffen DETTMER
* Deane Sloan wrote on Thu, May 29, 2008 at 04:47 +1200: stated, the overall risk of generating such a key on an unaffected system is (extremely?) small for the security that a 2048bit RSA private key is intended for? The risk to generate one specific key of 2^16 (or how small was the key

RE: Wider fallout from Debian issue?

2008-05-28 Thread David Schwartz
David Schwartz wrote: ... Suppose I include a randomish string in my message 46e8bd8ceae57f8b7af66536e7859bad. Any attacker might see this message -- it's public. So he can certainly try that string as your password. So will you now run off and add it to a blacklist, since it's

Re: Wider fallout from Debian issue?

2008-05-28 Thread Victor Duchovni
On Wed, May 28, 2008 at 03:38:47PM -0700, David Schwartz wrote: In principle, specifically avoiding these keys weakens the algorithm by reducing the keyspace. Only against random attacks of course, if all attackers first check these keys, then removing them strengthens the algorithm against

RE: Wider fallout from Debian issue?

2008-05-28 Thread David Schwartz
On Wed, May 28, 2008 at 03:38:47PM -0700, David Schwartz wrote: In principle, specifically avoiding these keys weakens the algorithm by reducing the keyspace. Only against random attacks of course, if all attackers first check these keys, then removing them strengthens the algorithm

Re: Wider fallout from Debian issue?

2008-05-28 Thread Victor Duchovni
On Wed, May 28, 2008 at 04:31:20PM -0700, David Schwartz wrote: Only against random attacks of course, if all attackers first check these keys, then removing them strengthens the algorithm against (non-random) brute-force attack. This said, the effort of explicitly avoiding these is

Re: Wider fallout from Debian issue?

2008-05-28 Thread Michael Sierchio
David Schwartz wrote: Every known key, provided there are not too many known keys, is weak. Once again, you have a very idiosyncratic lexicon of cryptographic terms. How about if we use these words the way cryptographers do? A weak key is one that causes a cipher to leak private data in the

RE: Wider fallout from Debian issue?

2008-05-28 Thread David Schwartz
David Schwartz wrote: Every known key, provided there are not too many known keys, is weak. Once again, you have a very idiosyncratic lexicon of cryptographic terms. How about if we use these words the way cryptographers do? A weak key is one that causes a cipher to leak private