[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: ssl security desaster



On Tue, May 27, 2008 at 05:49:59PM +0200, Patrik Fimml wrote:
> On Tue, May 27, 2008 at 04:51:36PM +0200, Florian Weimer wrote:
> > > Well, I actually had false positives (on amd64) -- even freshly
> > > generated keys with the new libopenssl package were reported as bad,
> > > which irritated me a bit.
> > 
> > And you've already deleted those keys, right?  How convenient. 8-/
> 
> No, actually, /all/ keys I generated were allegedly weak -- this means, after
> executing ssh-keygen and dowkd.pl five times, I stuck to the key.

This rings all my alarm bells. In similar cases I've had reported to me,
it always turned out that e.g. somebody had upgraded openssl but not
libssl0.9.8, or something similar.

> (ssh-vulnkey thinks it is fine though.)

While I'm very confident in ssh-vulnkey's accuracy, note that
ssh-vulnkey has two different states you might interpret as "fine": "Not
blacklisted" (i.e. definitely fine) and "Unknown (no blacklist
information)" (i.e. no blacklist file installed for this key type and
size). In the most recent upload to unstable, I clarified the second
state to "Unknown (blacklist file not installed)" and added more
detailed documentation in the manual page.

-- 
Colin Watson                                       [cjwatson@debian.org]


Reply to: