LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Linux - Security (https://www.linuxquestions.org/questions/linux-security-4/)
-   -   WARN: OpenSSL (Debian and Debian-based distros) (https://www.linuxquestions.org/questions/linux-security-4/warn-openssl-debian-and-debian-based-distros-641961/)

win32sux 05-13-2008 03:11 PM

WARN: OpenSSL (Debian and Debian-based distros)
 
From the Debian Security Advisory (DSA-1571-1):
Quote:

Luciano Bello discovered that the random number generator in Debian's openssl package is predictable. This is caused by an incorrect Debian-specific change to the openssl package (CVE-2008-0166). As a result, cryptographic key material may be guessable.

This is a Debian-specific vulnerability which does not affect other operating systems which are not based on Debian. However, other systems can be indirectly affected if weak keys are imported into them.

It is strongly recommended that all cryptographic key material which has been generated by OpenSSL versions starting with 0.9.8c-1 on Debian systems is recreated from scratch. Furthermore, all DSA keys ever used on affected Debian systems for signing or authentication purposes should be considered compromised; the Digital Signature Algorithm relies on a secret random value used during signature generation.

The first vulnerable version, 0.9.8c-1, was uploaded to the unstable distribution on 2006-09-17, and has since that date propagated to the testing and current stable (etch) distributions. The old stable distribution (sarge) is not affected.

Affected keys include SSH keys, OpenVPN keys, DNSSEC keys, and key material for use in X.509 certificates and session keys used in SSL/TLS connections. Keys generated with GnuPG or GNUTLS are not affected, though.
DSA-1571-1 | CVE-2008-0166 | Secunia Advisory

XavierP 05-13-2008 06:01 PM

http://www.regdeveloper.co.uk/2008/0...n_openssl_bug/ - looks as though they've fixed their mistake.

uid0sd 05-13-2008 08:21 PM

https://lists.ubuntu.com/archives/ub...ay/000705.html

http://lists.debian.org/debian-secur.../msg00152.html

I went ahead & dist-upgraded and during the upgrade SSH keys were regenerated, nice.

Does this mean everything I generated an SSL certificate for should also be recreated???

aus9 05-13-2008 10:47 PM

I got a email from Mdv which in parts says

While this patch was never applied to the Mandriva OpenSSL package, it is possible that these weak keys or certificates exist on Mandriva systems. In particular, this could affect systems that provide SSH or VPN services to many users, some of which may be Debian or Ubuntu users, resulting in the possibility that these weak keys or certificates exist.

No update exists at mdv last time I checked today.

-------

I suggest this email could apply to other distro users as well.

EDIT

http://archives.mandrivalinux.com/se...5/msg00015.php

farslayer 05-14-2008 08:32 AM

Some useful articles specifically related to this issue.

HOW-TO Regenerate your Keys on Debian
Quote:

regenerate and distribute any potentially vulnerable keys. Instructions for how to regenerate the keys for these applications are below. You can also test to see if keys are vulnerable using the dowkd.pl utility as described below.
and the forthcoming

Implementing Key Rollover in Debian

win32sux 05-17-2008 07:37 AM

One of the most interesting pages I've seen so far regarding this issue is H D Moore's.

win32sux 05-28-2008 07:05 PM

I'm proceeding to unsticky this thread. Considering the unbelievable amount of coverage this issue received in the blogosphere and Debian mailing lists during the first week, any Debian system administrator who hasn't heard of this by now is probably living under a rock. Feel free to post any questions/comments related to this historically significant vulnerability, though.


All times are GMT -5. The time now is 11:10 PM.