On Wed, Jun 18, 2008 at 05:47:45PM -0700, Kees Cook wrote:
> On Wed, Jun 11, 2008 at 03:20:45PM -0700, Ivan Kohler wrote:
> > As a "past standard" key size, I believe it should be treated (for 
> > blacklist purposes) as a standard key size, not as a non-standard key 
> > size, and thus included in -blacklist instead of -blacklist-extra.
> 
> During the window when openssl was broken, openssh did not produce
> RSA-1024 keys.

Yes, I understand that.

> As a result, that blacklist is not being included in the
> default package.  However, it is available in openssl-blacklist-extra.

I believe that to be a grave oversight and constitute a serious security 
issue that needs to be addressed.

Use case/example:

1. Joe admin has been running Debian for years now, appreciating the 
ability to upgrade his systems without reinstalling.  Joe has never used 
"non-standard key sizes", and indeed, while he knows the he should use 
SSH instead of telnet, he doesn't actually pay attention to the details 
or change the defaults.

2. Joe receives a security advisory or otherwise finds out about the 
OpenSSL vulnerability.  Joe notes that the security advisory tells him 
to run "openssh-vulnkey" to scan his system for vulnerable keys.

3. Joe runs "openssh-vulnkey" on the systems he administers, and while 
it does point out some keys that are safe, and some that are 
compromised, he can't make heads or tails of this "Unknown (no blacklist 
information)" error.  Isn't this tool supposed to provide assurance that 
his keys are safe?  Joe doesn't understand why the tool he was told 
to run to verify his keys is giving him "Unknown" errors.

4. Joe admin gives up and switches to a distribution that actually cares 
about its users.

The OpenSSL vulnerability is a serious problem for Debian.  Distributing 
a tool that is *supposed* to scan for vulnerable keys and then making 
the output of that tool useless for anyone who has been running Debian 
for more than a year borders on absurd.

-blacklist-extra is *NOT* available in etch, and is *NOT* installed by 
default like -blacklist.  Telling admins to use backports.org if they've 
been running Debian for more than a release is *NOT* the kind of 
security support we should be providing to our users.

What is the perceived disadvantage or problem with including the 
RSA-1024 blacklist in the standard, etch -blacklist package?  2 megs of 
disk space?  Is there anything else?

If saving 2 megs is the only reason not to include RSA-1024, it would 
seem we are doing a disservice to the vast majority of our users by 
leaving it out, for the sake of a very small number of users using 
embedded or obsolete hardware.

Please, please, please seriously consider including RSA-1024 in 
openssh-blacklist and upload to etch ASAP as a security fix.

-- 
Ivan Kohler
ivan at debian.org



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to