[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: gnutls security breach



On 06/03/14 05:59, NoSpaze wrote:
> On Wed, 2014-03-05 at 03:10 -0500, Ric Moore wrote:
>> Anyone see this?
>> http://arstechnica.com/security/2014/03/critical-crypto-bug-leaves-linux-hundreds-of-apps-open-to-eavesdropping/
>> Yeow! I just did update / upgrade to Jessy, but didn't see the security 
>> fix come through yet. Ric
> 
> I wanted to know if this has a major influence on my system:

And your system is?

> 
> # lsof -n | grep libgnutls|awk '{ print $1; }'|sort|uniq -c
<snipped>
> 
> So, no problem for me, but seeing apache there makes me think If I
> should continue to use online banking...

Have you applied the libgnutls security update?

Puzzled. How would apache - running your own web server - impact on the
ssl certs your system authenticates as part of your online banking?

Both apache and your server use gnutls for handling SSL, TLS and DTLS -
aside from that there's no connections I can see.

<opinion class=biased authority=unknown>
As always if you want secure connections get up and walk. Otherwise the
best you can do, after limiting your risk exposure and maintaining good
OpSec and a secure system is:-
;visually confirm the cert footprint to ascertain it belongs to the
issuer - particularly if it changes (see your cert settings in your browser)
;check with DNSSEC that the site issuing the cert is the site it claims
to be.
Given that most users don't do the former - even though I can't think of
a major cert issuer who hasn't been compromised, and most enterprise
resists implementation of DNSSEC... SNAFU(?)
Internet banking will always be a risk, likewise any secure
communications using resources outside your control. It's always an
end-to-end equation with at least two unreliable meatbags at either end,
and the triviality of capture and replay at a later date with additional
information.
</opinion>

> 
> Anyway, I don't find any concrete information on the bug's effects on
> common systems...

Did you try searching this list for information?
Was the information I provided earlier in this thread insufficient? What
do you mean by "I don't find"? It took me all of ten minutes to find
more detail on the *past* bug than I had time to read since.

You could check the git and see what has changed, and why, since Simon
Josefsson wrote the relevant section of code - or just rely on second
and third hand "interpretations". I'm not sure what choices you have.

*Theoretically* the bug, since patched, *may* have allowed an attacker
using a carefully crafted X.509 certificate, of which no working proof
has been found, to play MITM. You would need to accept this certificate
or it won't work. I'm not attempting to mitigate the risks - just
counter the over-hyped, ill-informed, chorus of monkey blogs/"news"
channels that seek to inflate their readerships by conflating possible
with actual.
In a world of breached certificate "authorities", and compromised banks,
networks, and DNS - MTM is a constant risk even if ssl/tls/dtls was easy
to secure *and* certificate issuers adhered to a standard that allowed that.

<snipped>

Kind regards


Reply to: