Visit Jeremy's Blog.
Go Back > Forums > Linux Forums > Linux - Security
User Name
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.


  Search this Thread
Old 05-13-2008, 03:11 PM   #1
LQ Guru
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 377Reputation: 377Reputation: 377Reputation: 377
Exclamation WARN: OpenSSL (Debian and Debian-based distros)

From the Debian Security Advisory (DSA-1571-1):
Luciano Bello discovered that the random number generator in Debian's openssl package is predictable. This is caused by an incorrect Debian-specific change to the openssl package (CVE-2008-0166). As a result, cryptographic key material may be guessable.

This is a Debian-specific vulnerability which does not affect other operating systems which are not based on Debian. However, other systems can be indirectly affected if weak keys are imported into them.

It is strongly recommended that all cryptographic key material which has been generated by OpenSSL versions starting with 0.9.8c-1 on Debian systems is recreated from scratch. Furthermore, all DSA keys ever used on affected Debian systems for signing or authentication purposes should be considered compromised; the Digital Signature Algorithm relies on a secret random value used during signature generation.

The first vulnerable version, 0.9.8c-1, was uploaded to the unstable distribution on 2006-09-17, and has since that date propagated to the testing and current stable (etch) distributions. The old stable distribution (sarge) is not affected.

Affected keys include SSH keys, OpenVPN keys, DNSSEC keys, and key material for use in X.509 certificates and session keys used in SSL/TLS connections. Keys generated with GnuPG or GNUTLS are not affected, though.
DSA-1571-1 | CVE-2008-0166 | Secunia Advisory

Last edited by win32sux; 05-13-2008 at 03:32 PM.
Old 05-13-2008, 06:01 PM   #2
Registered: Nov 2002
Location: Kent, England
Distribution: Debian Testing
Posts: 19,192
Blog Entries: 4

Rep: Reputation: 470Reputation: 470Reputation: 470Reputation: 470Reputation: 470 - looks as though they've fixed their mistake.
Old 05-13-2008, 08:21 PM   #3
Registered: Aug 2006
Distribution: Mac OS X, Debian, Ubuntu
Posts: 37

Rep: Reputation: 15

I went ahead & dist-upgraded and during the upgrade SSH keys were regenerated, nice.

Does this mean everything I generated an SSL certificate for should also be recreated???
Old 05-13-2008, 10:47 PM   #4
LQ Addict
Registered: Oct 2003
Location: Australia
Distribution: MX 16
Posts: 5,283

Rep: Reputation: Disabled
I got a email from Mdv which in parts says

While this patch was never applied to the Mandriva OpenSSL package, it is possible that these weak keys or certificates exist on Mandriva systems. In particular, this could affect systems that provide SSH or VPN services to many users, some of which may be Debian or Ubuntu users, resulting in the possibility that these weak keys or certificates exist.

No update exists at mdv last time I checked today.


I suggest this email could apply to other distro users as well.


Last edited by aus9; 05-13-2008 at 10:53 PM. Reason: link added
Old 05-14-2008, 08:32 AM   #5
LQ Guru
Registered: Oct 2005
Location: Willoughby, Ohio
Distribution: linuxdebian
Posts: 7,232
Blog Entries: 5

Rep: Reputation: 190Reputation: 190
Some useful articles specifically related to this issue.

HOW-TO Regenerate your Keys on Debian
regenerate and distribute any potentially vulnerable keys. Instructions for how to regenerate the keys for these applications are below. You can also test to see if keys are vulnerable using the utility as described below.
and the forthcoming

Implementing Key Rollover in Debian

Last edited by farslayer; 05-14-2008 at 08:34 AM.
Old 05-17-2008, 07:37 AM   #6
LQ Guru
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Original Poster
Rep: Reputation: 377Reputation: 377Reputation: 377Reputation: 377
One of the most interesting pages I've seen so far regarding this issue is H D Moore's.
Old 05-28-2008, 07:05 PM   #7
LQ Guru
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Original Poster
Rep: Reputation: 377Reputation: 377Reputation: 377Reputation: 377
I'm proceeding to unsticky this thread. Considering the unbelievable amount of coverage this issue received in the blogosphere and Debian mailing lists during the first week, any Debian system administrator who hasn't heard of this by now is probably living under a rock. Feel free to post any questions/comments related to this historically significant vulnerability, though.


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off

Similar Threads
Thread Thread Starter Forum Replies Last Post
differences between debian and debian-based distros dratix Debian 8 05-03-2008 11:05 AM
Debian Based Distros Rick069 Linux - General 7 09-19-2005 05:44 AM
Any Debian-based distros that are optimized for 686? lefty.crupps Debian 8 06-16-2005 08:43 AM
debian / other debian based distros... ptawe Linux - Distributions 8 04-07-2005 02:26 PM
Debian based distros Culbert Linux - Distributions 3 05-01-2003 04:23 AM > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 06:39 AM.

Main Menu
Write for LQ is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration